Technical Field
[0001] Embodiments described herein relate generally to a re-encryption key generator, a
re-encryption device, an encryption device, a decryption device, and a program.
Background Art
[0002] In a file sharing system in which a file is shared among a plurality of users after
a user uploads the file to a server, a method of re-encryption is known to maintain
secrecy of file with respect to the server.
Citation List
Non Patent Literature
[0003] Non Patent Literature 1:
R. Hayashi, T. Matsushita, T. Yoshida, Y. Fujii, and K. Okada, "Unforgeability of
Re-Encryption Keys against Collusion Attack in Proxy ReEncryption," In Proc. IWSEC
2011, LNCS 7038, pp. 210-229, Springer-Verlag, 2011.
Summary of Invention
Technical Problem
[0004] A conventional re-encryption scheme presents no particular problem, but if a problem
should arise, a server is enabled to create re-encrypted text without the permission
of each user. Therefore, from the viewpoint of realizing safe file sharing, there
is room for improvements in a proxy re-encryption scheme.
[0005] A re-encryption key generator according to an embodiment generates a re-encryption
key to obtain re-encrypted data that can be decrypted by a second private key of a
second user device by re-encrypting ciphertext obtained by encrypting plaintext by
a first public key of a first user device without decryption.
[0006] The re-encryption key generator includes a first storage means, a second storage
means, and a re-encryption key generation means.
[0007] The first storage means stores a first private key corresponding to the first public
key.
[0008] The second storage means stores a second re-encryption key generation key of the
second user device that is different from a second public key corresponding to the
second private key.
[0009] The re-encryption key generation means generates the re-encryption key based on the
first private key and the second re-encryption key generation key.
Brief Description of Drawings
[0010]
FIG. 1 is a schematic diagram showing a configuration of a re-encryption system according
to a first embodiment.
FIG. 2 is a sequence diagram illustrating an operation of key setup processing in
the embodiment.
FIG. 3 is a sequence diagram illustrating the operation of encryption processing in
the embodiment.
FIG. 4 is a sequence diagram illustrating the operation of re-encryption key generation
processing in the embodiment.
FIG. 5 is a sequence diagram illustrating the operation of re-encryption processing
in the embodiment.
FIG. 6 is a sequence diagram illustrating the operation of decryption processing in
the embodiment.
FIG. 7 is a diagram illustrating the configuration of a file sharing system according
to the embodiment.
FIG. 8 is a schematic diagram illustrating the file sharing system in the embodiment.
FIG. 9 is a diagram illustrating the configuration of a file sharing system according
to the embodiment.
FIG. 10 is a diagram illustrating the configuration of a file sharing system according
to the embodiment.
FIG. 11 is a schematic diagram showing the configuration of a re-encryption key generator
according to the embodiment.
FIG. 12 is a schematic diagram showing the configuration of a re-encryption system
according to a thirteenth embodiment.
FIG. 13 is a sequence diagram illustrating the operation of key setup processing in
the embodiment.
FIG. 14 is a sequence diagram illustrating the operation of encryption processing
in the embodiment.
FIG. 15 is a sequence diagram illustrating the operation of re-encryption key generation
processing in the embodiment.
FIG. 16 is a sequence diagram illustrating the operation of re-encryption processing
in the embodiment.
FIG. 17 is a sequence diagram illustrating the operation of decryption processing
in the embodiment.
FIG. 18 is a schematic diagram illustrating a file sharing system in the embodiment.
Description of Embodiments
[0011] Hereinafter, each embodiment will be described using the drawings. Each device shown
below can be carried out by either of a hardware configuration and a combined configuration
of hardware resources and software. As software of the combined configuration, as
shown in FIG. 1 or 12, a program causing each computer to realize the function of
each device by being installed on each computer from a network or one of non-transitory
computer-readable storage media M1 to M5 in advance and executed by the processor
of each computer is used.
(First embodiment)
[0012] First, a proxy re-encryption scheme will be described. The basic model of the proxy
re-encryption scheme includes five functions (hereinafter, also called algorithms)
of key generation, encryption, decryption, re-encryption key generation, and re-encryption,
shown below. The functions of key generation, encryption, and decryption are the same
as functions of normal public key cryptography.
(Key generation) KeyGen (λ) → (pk, sk)
[0013] The key generation algorithm KeyGen outputs a set (pk, sk) of a public key pk and
a private key sk when a security parameter λ is input.
(Encryption) Enc (pkA, m)→CA
[0014] The encryption algorithm Enc outputs ciphertext C
A addressed to a user A when a public key pk
A of a user A and a message m are input.
(Decryption) Dec (skA, CA)→m
[0015] The decryption algorithm Dec outputs the message m when a private key sk
A of the user A and the ciphertext C
A addressed to the user A are input.
(Re-encryption key generation)
ReKeyGen (pkA, skA, pkB, skB)→kA→B
[0016] The re-encryption key generation algorithm ReKeyGen outputs a re-encryption key rk
A→
B when the public key pk
A of the user A, the private key sk
A of the user A, a public key pk
B of a user B, and a private key sk
B of the user B are input.
(Re-encryption) ReEnc(rkA→B,CA)→CB
[0017] The re-encryption algorithm ReEnc outputs ciphertext C
B addressed to the user B when the re-encryption key rk
A→
B and the ciphertext C
A addressed to the user A are input.
[0018] The above is the basic model. However, depending on the implementation method of
re-encryption, a model that is different in input into the functions or a model including
other functions or keys than the above can also be considered.
[0019] For example, like the re-encryption scheme shown in the present embodiment, public
parameters (details will be described later) may be included for input into each function
of the encryption, decryption, re-encryption key generation, and re-encryption.
[0020] For example, like the re-encryption scheme shown in the present embodiment, a non-interactive
model that makes the private key sk
B of the user B unnecessary for input of the re-encryption key generation algorithm
ReKeyGen is considered. Also, a model into which, instead of the private key sk
A of the user A, the re-encryption key rk
A→
B addressed to the user B and a private key sk
C of a user C are input is also considered.
[0021] In addition, a unidirectional model in which while re-encryption of the ciphertext
C
A→C
B can be performed by the re-encryption key rk
A→
B, the inverse conversion of the ciphertext C
B→C
A cannot be performed, and a bidirectional model, in which the inverse conversion can
also be performed, are known. In the bidirectional model, the re-encryption key rk
A→
B may also be represented as rk
A⇔
B.
[0022] Further, in public key cryptography, a scheme based on ID-based encryption is also
considered. In this case, function setup for master key generation increases and the
master key and ID are added to the input of the key generation algorithm KeyGen. In
the ID-based encryption, the public key pk is the ID itself.
[0023] In the re-encryption key generation algorithm ReKeyGen, like the re-encryption scheme
shown in the present embodiment, instead of the public key pk
B of the user B, the re-encryption key generation key rk
B of the user B may be input. In this case, the key generation algorithm KeyGen and
the re-encryption key generation algorithm ReKeyGen are represented as shown below.
(Key generation) KeyGen (λ)→(pk, sk, rk, par)
[0024] The key generation algorithm KeyGen outputs a set (pk, sk, rk) of the public key
pk, the private key sk, and the re-encryption key generation key rk
B and a public parameter par when the security parameter λ is input. In the present
embodiment, this processing is called key setup processing. This also applies to embodiments
and modifications described later.
(Re-encryption key generation)
ReKeyGen (skA, rkB, par)→rkA→B
[0025] The re-encryption key generation algorithm ReKeyGen outputs the re-encryption key
rk
A→
B when the private key sk
A of the user A, the re-encryption key generation key rk
B of the user B, and the public parameter par are input.
[0026] Like the re-encryption scheme shown in the present embodiment, the public key pk
A of the user A and the public parameter par may be added as the input of the re-encryption
algorithm ReEnc. In this case, the re-encryption algorithm ReEnc is represented as
shown below.
(Re-encryption) ReEnc(rkA→B, CA, pkA, par)→CB
[0027] The re-encryption algorithm ReEnc outputs the ciphertext C
B addressed to the user B when the re-encryption key rk
A→
B, the ciphertext C
A addressed to the user A, the public key pk
A of the user A, and the public parameter par are input.
[0028] Next, The configuration of a file sharing system according to the present embodiment
will be described using FIG. 7. The file sharing system includes a server Sv as an
information processing apparatus owned by a service provider who provides a service
and user apparatuses A, B, C,...(hereinafter, may be abbreviated as users A, B, C,...
or may also be called a first user apparatus, a second user apparatus,...) as information
processing apparatuses owned by users as clients of the service. The server Sv and
the user apparatuses A, B. C... are connected via a communication network. The communication
network is, for example, a wireless LAN (Local Area Network), a cable LAN, an optical
network, a telephone network, an intra-net, an Ethernet (registered trademark), the
Internet, or a combination of the above networks. One unit of the server Sv may be
provided or a plurality of units thereof may be provided.
[0029] FIG. 8 is a schematic diagram illustrating the file sharing system. The file sharing
system includes the server Sv, the user A, the user B, the user C, a group administrator,
and a user administrator. The user administrator is an entity that administers all
users. The user administrator issues an ID and an initial password to enable a user
to log in to the file sharing system.
[0030] As a preparation, the group administrator is assumed to have a private key sk
Gr. Also, a public key pk
Gr of the group administrator is assumed to be stored in a public key storage unit 1
of the server Sv. Also, each user i is assumed to have a private key sk
i and a re-encryption key generation key rk
i. That is, the user A has sk
A and rk
A, the user B has sk
B and rk
B, and the user C has sk
C and rk
C. The server Sv and each user i can acquire the public parameter par and a public
key pk
i of each user i, but the description thereof is omitted here and a detailed description
will be provided later. In addition, file of plaintext to be shared is denoted as
m.
[0031] The user C encrypts the file m by the public key pk
Gr of the group administrator stored in the public key storage unit 1 and uploads obtained
ciphertext E(pk
Gr,m) to the server Sv. Here, E(PK,M) represents ciphertext obtained by encrypting plaintext
M by using the public key PK. The server Sv stores the ciphertext in a ciphertext
storage unit 2.
[0032] Now, assume that the user A approves sharing of the file m. The user A transmits
the re-encryption key generation key rk
A of the user A to the group administrator. The group administrator generates a re-encryption
key rk
Gr→
A that re-encrypts ciphertext E(pk
Gr,m) addressed to the group administrator into ciphertext E(pk
A,m) addressed to the user A using the private key sk
Gr of the group administrator and the re-encryption key generation key rk
A of the user A. The group administrator transmits the generated re-encryption key
rk
Gr→
A to the server Sv. The server Sv stores the re-encryption key rk
Gr→
A in a re-encryption key storage unit 3.
[0033] The user A transmits a request of re-encryption of the ciphertext E(pk
Gr,m) to the server Sv. In response to the request received from the user A, the server
Sv re-encrypts the ciphertext E(pk
Gr,m) into re-encrypted text E(pk
A,m) using the re-encryption key rk
Gr→
A stored in the re-encryption key storage unit 3 and addressed to the user A and transmits
the obtained re-encrypted text E(pk
A,m) to the user A. The re-encrypted text is ciphertext obtained by re-encrypting ciphertext.
[0034] The user A decrypts the re-encrypted text E(pk
A,m) downloaded from the server Sv by the private key sk
A held by the user A and uses the obtained file m.
[0035] The file sharing system as described above can hinder leakage of information in the
process of file sharing because the file m is not decrypted once between the encryption
by the user C and the decryption by the user A.
[0036] In addition, there is no need for the user C to decide with which user to share a
file when uploading ciphertext. That is, the user C only needs to encrypt the file
m by the public key pk
Gr of the group administrator and the key to be managed for encryption is only the public
key pk
Gr of the group administrator and therefore, costs for key management can be reduced.
[0037] In the present file sharing system, the server Sv does not have a decryption key
sk
Gr to decrypt the ciphertext E(pk
Gr,m). Therefore, the server Sv cannot decrypt the ciphertext. Accordingly, threats
of leakage by an invalid server Sv by decrypting ciphertext can be excluded and therefore,
strict control of the server Sv can be eliminated, leading to a reduction in management
costs.
[0038] In the proxy re-encryption scheme, the decryption right of ciphertext is transferred
to a transfer destination by re-encrypting ciphertext addressed to a transfer source
(group administrator in the above example) into ciphertext addressed to the transfer
destination (user A in the above example). In the proxy re-encryption scheme, the
public key of the transfer destination is included in the input of the re-encryption
key generation algorithm ReKeyGen (without the private key of the transfer destination
being included). Thus, to enable, for example, the user i to generate ciphertext E(pk
A,m') addressed to the user A by encrypting other file m' using the public key pk
A of the user A, the public key pk
A of the user A is published in advance (for example, when the system is started up).
[0039] On the other hand, even if the user A does not approve the transfer of the decryption
right of ciphertext to the user A, the public key pk
A of the user A is already published and thus, the group administrator can generate
the re-encryption key rk
Gr→
A. Therefore, there is the possibility of re-encryption (that is, the transfer of the
decryption right of ciphertext to the user A) without the approval of the user A.
[0040] In the present file sharing system, by contrast, the group administrator cannot generate
the re-encryption key rk
Gr→
A without the re-encryption key generation key rk
A being transmitted to the group administrator by the user A as the transfer destination.
Therefore, re-encryption (that is, the transfer of the decryption right of ciphertext
to the transfer destination) can be prevented when no approval of the transfer destination
is received.
[0041] The above also applies when the user B shares a file.
[0042] FIG. 1 is a schematic diagram showing the configuration of a re-encryption system
according to the first embodiment (the correspondence between FIG. 1 and FIG. 8 will
be described later). The re-encryption system includes a key generator 10, an encryption
device 20, a re-encryption key generator 30, a re-encryption device 40, and a decryption
device 50. The key generator 10 generates a public parameter of the re-encryption
system and a pair of public key/private key and a re-encryption key generation key
for each of the devices 30, 50 based on a security parameter. Here, the re-encryption
key generation key is a key that is different from the public key corresponding to
the private key of each of the devices 30, 50. The term "re-encryption key generation
key" may be changed to a desired name such as "re-encryption key generation data"
or "re-encryption key generation permission data".
[0043] The encryption device 20 encrypts plaintext data using the public key corresponding
to the private key of the re-encryption key generator 30 and the public parameter
and transmits the obtained ciphertext data to the re-encryption device 40.
[0044] The re-encryption key generator 30 generates a re-encryption key based on the private
key of the re-encryption key generator 30 and the re-encryption key generation key
of the decryption device 50 and transmits the obtained re-encryption key to the re-encryption
device 40. The re-encryption key generation key of the decryption device 50 is different
from the public key corresponding to the private key of the decryption device 50.
In the present embodiment, the re-encryption key is generated based on the private
key of the re-encryption key generator 30 and the re-encryption key generation key
of the decryption device 50, the public parameter, and a random number. However, the
random number is not required for generating a re-encryption key and may be omitted.
For example, in a fifth or twelfth embodiment, a re-encryption key is generated without
using any random number.
[0045] The re-encryption device 40 performs verification processing of ciphertext data received
from the encryption device 20 based on the public key of the re-encryption key generator
30, the public parameter, and the re-encryption key received from the re-encryption
key generator 30 and also re-encrypts the ciphertext data received from the encryption
device 20 without decryption and transmits the obtained re-encrypted data to the decryption
device 50. However, the verification processing is not required and may be omitted.
[0046] The decryption device 50 performs verification processing of re-encrypted data received
from the re-encryption device 40 based on the private key of the local device 50 and
the public parameter and also obtains plaintext data by performing decryption processing
of the re-encrypted data received from the re-encryption device 40. However, the verification
processing is not required and may be omitted. Here, a case when one unit is provided
for each of the key generator 10, the encryption device 20, the re-encryption key
generator 30, the re-encryption device 40, and the decryption device 50 is taken as
an example, though a plurality of units may be provided for each. The encryption device
20 may encrypt plaintext data using the public key of the encryption device 20 and
the public parameter to transmit the obtained ciphertext data to the re-encryption
device 40. In this case, the key generator 10 generates a public parameter, and a
pair of public key/private key and a re-encryption key generation key for each of
the devices 20, 50. The re-encryption key generator 30 generates a re-encryption key
based on the private key of the encryption device 20, the re-encryption key generation
key of the decryption device 50, the public parameter, and a random number and transmits
the obtained re-encryption key to the re-encryption device 40.
[0047] The correspondence between FIG. 1 and FIG. 8 will be described. Each of the devices
10 to 50 is held by an entity that performs the relevant processing. When the user
generates a set of a public key and private key and a re-encryption key generation
key of the user, the relevant user holds the key generator 10. If, for example, the
user administrator or the group administrator generates a set of a public key and
private key and a re-encryption key generation key of a user, the user administrator
or the group administrator holds the key generator 10. The user holds the encryption
device 20 or the decryption device 50 or both. The group administrator holds the re-encryption
key generator 30. When, for example, the user administrator or the server Sv generates
a re-encryption key, the user administrator or the server Sv holds the re-encryption
key generator 30. The server Sv holds the re-encryption device 40. In the file sharing
system illustrated in FIG. 8, the server Sv holds the public key storage unit 1 and
the user C who performs encryption acquires the public key used for encryption from
the public key storage unit 1, but the present embodiment is not limited to such an
example and, as will be described later, the user C may acquire the public key from
the key generator 10 (that has generated the public key used for encryption). The
server Sv stores the ciphertext E(pk
Gr,m) generated by the user C in the ciphertext storage unit 2, but the ciphertext storage
unit 2 may be included in the re-encryption device 40 or an external storage device
not included in the re-encryption device 40.
[0048] Each entity may include a portion or all of the key generator 10, the encryption
device 20, the re-encryption key generator 30, the re-encryption device 40, and the
decryption device 50. That is, which entity holds which device is not limited to the
above example and various variations can be considered. The user administrator and
the group administrator may be the same or different. A user may or may not serve
also as the user administrator, the group administrator, or both. The user administrator
or the group administrator may or may not serve also as a user. Each user device used
by each user may be called a first user device, a second user device,... Similarly,
the public key, the private key, and the re-encryption key generation key of each
user device may be called the first public key, the first private key, and the first
re-encryption key generation key of the first user device, the second public key,
the second private key, and the second re-encryption key generation key of the second
user device,...
[0049] Also, as shown, for example, in each of FIGS. 9 and 10, each entity may hold each
device. In FIG. 9, a server Sv2 holds the key generator 10 to generate a public parameter,
a set of a public key and private key and a re-encryption key generation key of the
user A, and a set of a public key and private key and a re-encryption key generation
key of the user B. The server Sv2 delivers the public parameter and a set of the public
key and private key and the re-encryption key generation key of the user A to the
user A, the public parameter and a set of the public key and private key and the re-encryption
key generation key of the user B to the user B, and the public parameter and the public
key of the user A to a server Sv1. The user A holds the encryption device 20, encrypts
plaintext data using the public key of the user A and the public parameter, and transmits
the obtained ciphertext data to the server Sv1. The server Sv2 holds the re-encryption
key generator 30, generates a re-encryption key using the private key of the user
A, the re-encryption key generation key of the user B, the public parameter, and a
random number, and delivers the obtained re-encryption key to the server Sv1. The
server Sv1 holds the re-encryption device 40, performs verification processing of
ciphertext data received from the user A based on the public key of the user A received
from the server Sv2, the public parameter, and the re-encryption key, and re-encrypts
the ciphertext data received from the user A without decryption to deliver the obtained
re-encrypted data to the user B. The user B holds the decryption device 50, performs
verification processing of re-encrypted data received from the server Sv1 based on
the private key of the user B and the public parameter, and also performs decryption
processing of the re-encrypted data received from the server Sv1 to obtain plaintext
data. The exchange of data between each entity is not limited to an electric communication
means such as cable communication, wireless communication and the like and, for example,
a physical communication means that distributes or delivers by hand a storage medium
in which data such as the re-encryption key generation key, re-encryption key, ciphertext
data, re-encrypted data and the like is stored may also be used. Alternatively, the
electric communication means and the physical communication means may be combined
to exchange data between each entity.
[0050] Even if only the electric communication means is used, as will be described later,
other entities than the relevant entities may be interposed. Consider a case when
data (for example, the re-encryption key generation key) is transmitted from some
entity (hereinafter, called the first entity) to another entity (hereinafter, called
the second entity). The first entity is, for example, the user A. The second entity
is, for example, the group administrator. The first entity transmits data to an entity
(hereinafter, called the third entity) other than the second entity. The third entity
is, for example, the server Sv1. Next, the second entity receives the relevant data
from the third entity.
[0051] In FIG. 10, the user A holds the key generator 10 to generate a public parameter,
a set of a public key and private key and a re-encryption key generation key of the
user A, and a set of a public key and private key and a re-encryption key generation
key of the user B. The user A delivers the public parameter and a set of the public
key and private key and the re-encryption key generation key of the user B to the
user B and the public parameter and the public key of the user A to the server Sv1.
The user A holds the encryption device 20, encrypts plaintext data using the public
key of the user A and the public parameter, and transmits the obtained ciphertext
data to the server Sv1. The user A holds the re-encryption key generator 30, generates
a re-encryption key using the private key of the user A, the re-encryption key generation
key of the user B, the public parameter, and a random number, and delivers the obtained
re-encryption key to the server Sv1. The server Sv1 holds the re-encryption device
40, performs verification processing of ciphertext data received from the user A based
on the public key of the user A received from the user A, the public parameter, and
the re-encryption key, and re-encrypts the ciphertext data received from the user
A without decryption to deliver the obtained re-encrypted data to the user B. The
user B holds the decryption device 50, performs verification processing of re-encrypted
data received from the server Sv1 based on the private key of the user B and the public
parameter, and also performs decryption processing of the re-encrypted data received
from the server Sv1 to obtain plaintext data.
[0052] Subsequently, the configuration of each of the devices 10 to 50 will concretely be
described.
[0053] The key generator 10 includes a key generation parameter storage unit 11, a temporary
data storage unit 12, a public parameter generation unit 13, a key generation unit
14, a communication unit 15, and a control unit 16.
[0054] The key generation parameter storage unit 11 is a storage device that stores a key
generation parameter.
[0055] The temporary data storage unit 12 is a storage device that stores transient data
(hereinafter, also called temporary data) such as data being processed by each of
the generation units 13, 14 and processing results.
[0056] The public parameter generation unit 13 generates a public parameter for key generation.
[0057] The key generation unit 14 generates a pair of a public key/private key and a re-encryption
key generation key.
[0058] The communication unit 15 is a communication interface to communicate with the other
devices 20 to 50 and has, for example, a function to transmit the public parameter
and a pair of the public key/private key and the re-encryption key generation key
of each of the devices 30, 50 in the temporary data storage unit 12 to each of the
relevant devices 30, 50 under the control of the control unit 16, a function to transmit
the public key of the re-encryption key generator 30 in the temporary data storage
unit 12 to the encryption device 20 under the control of the control unit 16, and
a function to transmit the public parameter and the public key of the re-encryption
key generator 30 in the temporary data storage unit 12 to the re-encryption device
40 under the control of the control unit 16. In the description that follows, the
description that transmission/reception goes through the communication unit 15 may
be omitted, to avoid a redundant description. This also applies to descriptions of
communication units of the other devices 20 to 50.
[0059] The control unit 16 has a function to control each of the units 11 to 15 such that
each unit operates as shown in FIG. 2.
[0060] The encryption device 20 includes a temporary data storage unit 21, a communication
unit 22, an encrypted data generation unit 23, a ciphertext generation unit 24, and
a control unit 25.
[0061] The temporary data storage unit 21 is a storage device that stores a public parameter
received from the key generator 10 and a public key of the re-encryption key generator
30 and also transient data such as data being processed by each of the generation
devices 23, 24 and processing results.
[0062] The communication unit 22 is a communication interface to communicate with the other
devices 10, 30 to 50 and has, for example, a function to acquire and write the public
parameter received from the key generator 10 and the public key of the re-encryption
key generator 30 into the temporary data storage unit 21 and a function to transmit
ciphertext data in the temporary data storage unit 21 to the re-encryption device
40 under the control of the control unit 25.
[0063] The encryption parameter generation unit 23 has a function to generate an encryption
parameter.
[0064] The ciphertext generation unit 24 has a function to generate ciphertext data by encrypting
plaintext data using the public parameter read from the temporary data storage unit
21 and the public key of the re-encryption key generator 30 (first public key of the
first user device) and a function to write the obtained ciphertext data into the temporary
data storage unit 21.
[0065] The control unit 25 has a function to control each of the units 21 to 24 such that
each unit operates as shown in FIG. 3.
[0066] The re-encryption key generator 30 includes a private key storage unit 31, a temporary
data storage unit 32, a communication unit 33, a re-encryption key generation unit
34, a control unit 35, and a random number generation unit 36.
[0067] The private key storage unit 31 is a storage device that stores a private key of
the re-encryption key generator 30 received from the key generator 10.
[0068] The temporary data storage unit 32 is a storage device that stores a public parameter
received from the key generator 10 and a re-encryption key generation key of the decryption
device 50 and also temporary data such as data being processed by the re-encryption
key generation unit 34 and processing results.
[0069] The communication unit 33 is a communication interface to communicate with the other
devices 10, 20, 40, 50 and has, for example, a function to acquire and write the public
parameter received from the key generator 10 and the re-encryption key generation
key of the decryption device 50 into the temporary data storage unit 32 and a function
to transmit the re-encryption key in the temporary data storage unit 32 to the re-encryption
device 40 under the control of the control unit 35.
[0070] The re-encryption key generation unit 34 has a function to generate a re-encryption
key based on the private key of the re-encryption key generator 30 (first private
key of the first user device) read from the private key storage unit 31, the public
parameter and the re-encryption key generation key of the decryption device 50 (second
re-encryption key generation key of the second user device) read from the temporary
data storage unit 32, and a random number generated by the random number generation
unit 36 and a function to write the re-encryption key into the temporary data storage
unit 32.
[0071] The control unit 35 has a function to control each of the units 31 to 34, 36 such
that each unit operates as shown in FIG. 4.
[0072] The random number generation unit 36 has a function to generate a random number and
to send out the random number to the re-encryption key generation unit 34.
[0073] The re-encryption key generator 30 has a re-encryption key generation key storage
unit (not shown) as a storage device that stores a re-encryption key generation key
of the local device 30 received from the key generator 10 when the re-encryption key
generation key of the local device 30 is received from the key generator 10.
[0074] The re-encryption device 40 includes a re-encryption key storage unit 41, a temporary
data storage unit 42, a communication unit 43, a re-encryption processing unit 44,
a re-encryption parameter generation unit 45, and a control unit 46.
[0075] The re-encryption key storage unit 41 is a storage unit that stores a re-encryption
key received from the re-encryption key generator 30.
[0076] The temporary data storage unit 42 is a storage device that stores a public parameter
received from the key generator 10 and a public key of the re-encryption key generator
30 and also temporary data such as data being processed by the re-encryption processing
unit 44 and processing results.
[0077] The communication unit 43 is a communication interface to communicate with the other
devices 10 to 30, 50 and has, for example, a function to acquire and write the public
parameter received from the key generator 10 and the public key of the re-encryption
key generator 30 into the temporary data storage unit 42, a function to send out ciphertext
data received from the encryption device 20 to the re-encryption processing unit 44,
and a function to transmit re-encrypted data in the temporary data storage unit 42
to the decryption device 50 under the control of the control unit 46.
[0078] The re-encryption processing unit 44 has a function to obtain, when ciphertext data
is received from the encryption device 20, re-encrypted data by re-encrypting the
ciphertext data without decryption using the re-encryption key read from the re-encryption
key storage unit 41 and the public parameter and the public key of the re-encryption
key generator 30 read from the temporary data storage unit 42 and a function to write
the obtained re-encrypted data into the temporary data storage unit 42.
[0079] The control unit 46 has a function to control each of the units 41 to 45 such that
each unit operates as shown in FIG. 5.
[0080] The decryption device 50 includes a private key storage unit 51, a temporary data
storage unit 52, a communication unit 53, a decryption processing unit 54, a re-encryption
key generation key storage unit 55, and a control unit 56.
[0081] The private key storage unit 51 is a storage device that stores a private key of
the local device 50 received from the key generator 10.
[0082] The temporary data storage unit 52 is a storage device that stores a public parameter
received from the key generator 10 and temporary data such as data being processed
by the decryption processing unit 54 and processing results.
[0083] The communication unit 53 is a communication interface to communicate with the other
devices 10 to 40 and has, for example, a function to acquire and write the private
key of the local device 50 received from the key generator 10 into the private key
storage unit 51, a function to acquire and write the public parameter received from
the key generator 10 into the temporary data storage unit 52, and a function to send
out re-encrypted data received from the re-encryption device 40 to the decryption
processing unit 54.
[0084] The decryption processing unit 54 has a function to obtain plaintext data when re-encrypted
data is received from the re-encryption device 40 by performing decryption processing
of the re-encrypted data using the private key of the decryption device 50 (second
private key of the second user device) read from the private key storage unit 51 and
the public parameter read from the temporary data storage unit 52 and a function to
write the obtained plaintext data into the temporary data storage unit 52.
[0085] The re-encryption key generation key storage unit 55 is a storage device that stores
a re-encryption key generation key of the local device 50 received from the key generator
10.
[0086] The control unit 56 has a function to control each of the units 51 to 55 such that
each unit operates as shown in FIG. 6.
[0087] In the present embodiment, for example, the public parameter is stored in the temporary
data storage unit of each of the devices 10 to 50. However, the present embodiment
is not limited to such an example and the public parameter may be stored in a storage
unit (separate from the temporary data storage unit) of each of the devices 10 to
50. Thus, of data stored in the temporary data storage unit of each of the devices
10 to 50, data that does not have to be handled as transient data may be stored in
a storage unit (separately from the temporary data storage unit). When the public
parameter includes a plurality of elements, each of the devices 20 to 50 may acquire,
of each element of the public parameter, only elements needed for each piece of processing
described later. The above also apply to embodiments and modifications described later.
[0088] Next, the operation of the re-encryption system configured as described above will
be described using the sequence diagrams of FIGS. 2 to 6.
[0089] The following operation takes a case in which processing is performed in a procedure
of (1) key setup processing, (2) encryption processing, (3) re-encryption key generation
processing, (4) re-encryption processing, and (5) decryption processing as an example.
However, in the following operation, processing is not necessarily performed following
the above procedure. For example, processing of re-encryption key generation may be
performed before the encryption processing. Also, ciphertext data may be decrypted
without the re-encryption processing being performed.
(1) The key setup processing is performed by the key generator 10 as shown in FIG.
2 and each of steps ST1 to ST12 below.
[0090] First, the public parameter generation unit 13 of the key generator 10 generates
a public parameter

based on a security parameter λ stored in the key generation parameter storage unit
11 in advance or acquires the public parameter from outside (ST1).
[0091] More specifically, the public parameter generation unit 13 selects bilinear map groups
(G,G
T) satisfying the order p>2λ based on the security parameter λ stored in the key generation
parameter storage unit 11 in advance. In this case, p is an integer. p may be a prime
number or a composite number. The public parameter generation unit 13 randomly selects
elements g, g
1, g
2, u, v of G from G. The public parameter generation unit 13 randomly selects n from
Z
p* and calculates g
3=g
π, g
4=g
1π, and g
5=g
2π. Z
p* is a set (=(Z/pZ)
*) of integers mutually prime to Z
p and p and may also be called a multiplicative group Z
p* for p. Z
p is a set (=(Z/pZ) of integers equal to 0 or greater and less than p. g
3 is a value based on a random number n and a system fixed value g. g
4 is a value based on the random number n and a system fixed value g
1. g
5 is a value based on the random number n and a system fixed value g
2. Further, the public parameter generation unit 13 generates a one-time signature
algorithm Sig(Ĝ,Ŝ,V̂).
[0092] Ĝ in the one-time signature algorithm Sig(Ĝ,Ŝ,V̂) (hereinafter, Sig(Ĝ,Ŝ,V̂)
is also called Sig) means a function to generate a pair (ssk, svk) of a signature
key and a verification key (both are one-time keys), Ŝ means a function to generate
a signature σ for a message M, and V̂ means a function to validate the signature σ.
[0094] The bilinear map (denoted by e) is a map yielding e:G×G→G
T and satisfies the following three properties:
- 1. e(ga,hb)=e(g,h)ab holds for any (g,h)∈G×G and a, b∈Z, where Z is a set of integers.
- 2. e(g,h) is computable for any (g,h)∈G×G.
- 3. e(g,h)≠1GT always holds if g, h≠1G, where 1G is the unit element of G and 1GT is the unit element of GT.
[0095] The bilinear map group (denoted by G, G
T) is a group of the order p for which a bilinear map e:G×G→G
T exists. The above definition also means that if g
1=g
α and g
2=g
β for elements g, g
1, g
2 of G, the following equation holds (α is the exponent relating to elements g, g
1 of G and β is the exponent relating to elements g, g
2 of G). The "exponent relating to elements g, g
1 of G" is an exponent that defines the relationship between elements g, g
1 of G and represents a value α such that the element obtained by the α-th power of
g and g
1 are equal in G. Similarly, the "exponent relating to elements g, g
2 of G" is an exponent that defines the relationship between elements g, g
2 of G and represents a value β such that the element obtained by the β-th power of
g and g
2 are equal in G. As will be described later, G may also be expressed as a multiplicative
group and in such a case, if, for example, elements of G are points on an elliptic
curve, the exponent may be changed to a scalar, the α-th power to α times, and the
β-th power to β times.

[0096] Incidentally, a plurality of elements g, g
1, g
2 of G is a plurality of preset system fixed values. The plurality of system fixed
values is not limited to three elements of the bilinear map group G and a plurality
of elements such as two or four or more elements of G can also be used when appropriate.
The term "system fixed value" is interchangeable with "fixed value", "element", and
"system parameter".
[0097] In this specification, notation assuming that both G and G
T are multiplicative groups is adopted, but the embodiments are not limited to such
notation and each of G, G
T can be represented by a notation assuming that each is an additive group. That is,
for example, G may be represented as an additive group and G
T as a multiplicative group. For example, elements of G may be points on an elliptic
curve and elements of G
T may be elements on a finite field. As the bilinear map, a map that yields e:G
1×G
2→G
T for bilinear map groups G
1, G
2, G
T (G
1 and G
2 are different groups) may also be used. In this case, each element of G in each piece
of processing described later may be rewritten as element G
1 or element G
2, where appropriate. The above also apply to embodiments and modifications described
later.
[0098] Subsequently, the public parameter generation unit 13 writes the generated public
parameter par into the temporary data storage unit 12. The key generator 10 publishes
the public parameters par=(λ,p,G,G
T,g,g
1,g
2,g
3,g
4,g
5,u,v,Sig) in the temporary data storage unit 12 (ST2). If a public parameter is published
before step ST1 is executed, step ST1 and step ST2 may be skipped by writing the public
parameter into the temporary data storage unit 12.
[0099] If the identification information of the re-encryption key generator 30 is i, the
key generation unit 14 randomly selects elements x
i, y
i, z
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pki=(X
i,Y
1i,Y
2i,Z
i,Z
1i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0100] When verification processing using a formula (a2') described later is not performed,
data Y
2i may be omitted. That is, the public key pk
i only needs to include data X
i, Y
1i, Z
i, Z
1i.
[0101] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
5i) using the private key sk
i and the public parameter par (ST3).

[0102] Subsequently, the key generation unit 14 writes a pair of the generated public key/private
key and the re-encryption key generation key into the temporary data storage unit
12. The communication unit 15 transmits the private key sk
i and the re-encryption key generation key rk
i in the temporary data storage unit 12 to the re-encryption key generator 30 under
the control of the control unit 16 (ST4). The key generator 10 publishes the public
key pk
i of the re-encryption key generator 30 in the temporary data storage unit 12 (ST5).
[0103] Similarly, if the identification information of the decryption device 50 is j, the
key generation unit 14 randomly selects elements x
j, y
j, z
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j,z
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Y
2j,Z
j,Z
1j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0104] If, similarly as described above, the verification processing using a formula (a2')
described later is not performed, data Y
2j may be omitted. That is, the public key pk
j only needs to include data X
j, Y
1j, Z
j, Z
1j.
[0105] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y
5j) using the private key sk
j and the public parameter par (ST6).

[0106] Subsequently, the key generation unit 14 writes a pair of the generated public key/private
key and the re-encryption key generation key into the temporary data storage unit
12. The communication unit 15 transmits the private key sk
j and the re-encryption key generation key rk
j in the temporary data storage unit 12 to the decryption device 50 under the control
of the control unit 16 (ST7). The key generator 10 publishes the public key pk
j of the decryption device 50 in the temporary data storage unit 12 (ST8). If desired,
processing similar to steps ST6 to ST8 may be performed on a private key sk
h, a public key pk
h, and a re-encryption key generation key rk
h of the encryption device 20 to transmit the private key sk
h and the re-encryption key generation key rk
h to the encryption device 20 and to publish the public key pk
h. The key generator 10 may transmit only the private key (without transmitting the
re-encryption key generation key) to the encryption device 20, the re-encryption key
generator 30, or the decryption device 50. The key generator 10 may also transmit
only a portion or all of public keys generated in key setup processing to the encryption
device 20, the re-encryption key generator 30, or the decryption device 50. The above
also apply to embodiments and modifications described later.
[0107] With the above processing, the key setup processing is completed. Hereinafter, each
of the devices 20, 30, 40, 50 can acquire and use the public parameter or public key
published in steps ST2, ST5, ST8 when appropriate.
(2) The encryption processing is performed by the encryption device 20 as shown in
FIG. 3 and each of steps ST21 to ST24 below. The encryption device 20 is assumed to
have a public key pki of the re-encryption key generator 30 stored in the temporary data storage unit 21,
but if the encryption device 20 has not yet acquired the public key pki of the re-encryption key generator 30, the encryption device 20 may acquire the public
key pki of the re-encryption key generator 30 from, for example, the key generator 10 before
step ST 22 described below. Similarly, the encryption device 20 is assumed to have
the public parameter par stored in the temporary data storage unit 21, but if the
encryption device 20 has not yet acquired the public parameter par, the encryption
device 20 may acquire the public parameter par from, for example, the key generator
10 before step ST 21 described below.
[0108] The encryption parameter generation unit 23 of the encryption device 20 generates
a key pair (ssk,svk)=Ĝ(λ) of a signature key ssk and a verification key svk in a
one-time signature using the security parameter λ and a key pair generation function
Ĝ in the public parameter par (ST21) and sets the verification key svk to encrypted
data C
1 (C
1=svk).
[0109] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to the ciphertext generation unit 24.
[0110] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0111] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the encrypted data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21 (ST23).

[0112] The first argument of the function Ŝ is the signature key and the second argument
is data to be signed.
[0113] The function Ŝ accepts the signature key and data to be signed as input and outputs
a signature.
[0114] Thereafter, the ciphertext generation unit 24 generates ciphertext data Ci= (C
1, C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4, σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0115] If the verification processing in step ST41 described later is omitted, the ciphertext
data C
i=(C
1,C
2X,C
2Y,C
2Z,C
2Z1,C
3,C
4,σ) may be set as C
i=(C
2X,C
2Y,C
2Z,C
2Z1,C
3) by omitting verification data (C
1,C
4,σ) that is not used for decryption. In this case, processing to generate the verification
data (C
1,C
4,σ) is also omitted. In the present embodiment, as described above (or will be described
below), verification may be omitted or generation of verification data may be omitted
and this also applies to embodiments and modifications described below.
[0116] In any case, the communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to the re-encryption device 40 under the control
of the control unit 25 (ST24).
[0117] With the above processing, the encryption processing is completed.
(3) The re-encryption key generation processing is performed by the re-encryption
key generator 30 as shown in FIG. 4 and each of steps ST31 to ST33 below. The re-encryption
key generator 30 is assumed to have the public parameter par stored in the temporary
data storage unit 32, but if the re-encryption key generator 30 has not yet acquired
the public parameter par, the re-encryption key generator 30 may acquire the public
parameter par from, for example, the key generator 10 before step ST 32 described
below.
[0118] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. The communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into the temporary data storage unit 32 under the control
of the control unit 35 (ST31). In step ST31, the key generator 10 (instead of the
decryption device 50) may transmit the re-encryption key generation key rk
j to the re-encryption key generator 30. This also applies to embodiments and modifications
described later.
[0119] Regarding the temporary data storage unit 32, as shown in FIG. 11, the re-encryption
key generator 30 may hold a public parameter storage unit 321 and a re-encryption
key generation key storage unit 322 in the temporary data storage unit 32 to store
the public parameter par in the public parameter storage unit 321 and the re-encryption
key generation key rk
j of the decryption device 50 in the re-encryption key generation key storage unit
322. The public parameter storage unit 321 that stores the public parameter par may
be outside the temporary data storage unit 32. Also, the re-encryption key generation
key storage unit 322 that stores the re-encryption key generation key rk
j may be outside the temporary data storage unit 32. The above also apply to embodiments
and modifications described later. In step ST4 described above, the communication
unit 33 receives the private key sk
i of the re-encryption key generator 30 from the key generator 10 and writes the private
key sk
i into the private key storage unit 31.
[0120] The random number generation unit 36 generates and sends out a random number θ∈Z
p* to the re-encryption key generation unit 34.
[0121] The re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas using the random number θ, the private key sk
i of the re-encryption key generator 30 in the private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).

[0122] In the above formulas, g
2 is rewritten and denoted by g
β.
[0123] Thereafter, the re-encryption key generation unit 34 writes the generated re-encryption
key R
ij into the temporary data storage unit 32. The communication unit 33 transmits the
re-encryption key R
ij in the temporary data storage unit 32 to the re-encryption device 40 under the control
of the control unit 35 (ST33).
[0124] With the above processing, the re-encryption key generation processing is completed.
(4) The re-encryption processing is performed by the re-encryption device 40 as shown
in FIG. 5 and each of steps ST41 to ST43 below. The re-encryption device 40 is
assumed to have a public key pki of the re-encryption key generator 30 stored in the temporary data storage unit 42,
but if the re-encryption device 40 has not yet acquired the public key pki of the re-encryption key generator 30, the re-encryption device 40 may acquire the
public key pki of the re-encryption key generator 30 from, for example, the re-encryption key generator
30 before step ST 41 described below. Similarly, the re-encryption device 40 is assumed
to have the public parameter par stored in the temporary data storage unit 42, but
if the re-encryption device 40 has not yet acquired the public parameter par, the
re-encryption device 40 may acquire the public parameter par from, for example, the
key generator 10 before step ST 41 described below.
[0125] The communication unit 43 of the re-encryption device 40 writes the ciphertext data
C
i transmitted in step ST24 and the re-encryption key R
ij transmitted in step ST33 into the temporary data storage unit 42.
[0126] The re-encryption processing unit 44 verifies the ciphertext data C
i in the temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formula
(ST41).

[0127] The first argument of the function V̂ is a verification key, the second argument
is a signature, and the third argument is data to be signed.
[0128] The function V̂ verifies the signature for the data to be verified using the verification
key and outputs "1" when the signature is determined to be valid and any value other
than "1" (for example, "0") when the signature is determined not to be valid.
[0129] Therefore, the fifth verification formula in the formula (a1) shows that the one-time
signature σ is valid by verifying the signature σ for the encrypted data C
3, C
4 as data to be signed by using the encrypted data C
1 as the verification key.
[0130] The verification is successful if the five verification formulas in the formula (a1)
all hold and fails if any one of the five formulas does not hold.
[0131] If the verification is successful (or the verification processing in step ST41 is
skipped), the re-encryption parameter generation unit 45 generates and sends out three
random numbers s,t,k∈Z
p* to the re-encryption processing unit 44.
[0132] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s, t, k, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0133] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(C
1,C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X,C
5Y, C
5Z, C
3, C
4, σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1 in the ciphertext data C
i with all the above re-encrypted data C
2X' to C
5Z and writes the obtained re-encrypted data C
j into the temporary data storage unit 42. If verification processing in step ST51
in decryption processing described later is omitted, the re-encrypted data C
j=(C
1, C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z, C
3, C
4, σ) may be set as C
j= (C
2X", C
2Y", C
2Z", C
2Z1", C
5X, C
5Y, C
5Z, C
3) by omitting verification data (C
1, C
2X', C
2Y', C
2Z', C
2Z1', C
4, σ) not used for decryption. In this case, processing to generate the verification
data (C
2X', C
2Y', C
2Z', C
2Z1') is also omitted.
[0134] In any case, the communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of the control unit 46 (ST43).
[0135] With the above processing, the re-encryption processing is completed.
[0136] Incidentally, the re-encryption processing unit 44 may perform the re-encrypted data
generation processing in step ST42 by omitting the verification processing in step
ST41. When verification data (C
1,C
4,σ) is not contained in the ciphertext data C
i, the re-encryption processing unit 44 performs the re-encrypted data generation processing
in step ST42 by omitting the verification processing in step ST41.
(5) The decryption processing is performed by the decryption device 50 as shown in
FIG. 6 and each of steps ST51 and ST52 below. The decryption device 50 is assumed
to have the public parameter par stored in the temporary data storage unit 52, but
if the decryption device 50 has not yet acquired the public parameter par, the decryption
device 50 may acquire the public parameter par from, for example, the key generator
10 before step ST 51 described below.
[0137] The communication unit 53 of the decryption device 50 receives the re-encrypted data
C
j transmitted in step ST43 and writes the re-encrypted data C
j into the temporary data storage unit 52.
[0138] The decryption processing unit 54 verifies the re-encrypted data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0139] Instead of the fifth verification formula in the formula (a2), the following verification
formula may be used.

[0140] Also, instead of the fifth verification formula in the formula (a2), the following
verification formula may be used.

[0141] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0142] Also, instead of the sixth verification formula in the formula (a2), the following
verification formula may be used.

[0143] Also, instead of the sixth verification formula in the formula (a2), the following
verification formula may be used.

[0144] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0145] The verification is successful if the seven verification formulas in the formula
(a2) all hold and fails if any one of the seven formulas does not hold.
[0146] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0147] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0148] In the following calculation, g
1 is rewritten and denotd by g
α and g
2 is rewritten and denoted by g
β.

[0149] With the above processing, the decryption processing is completed.
[0150] Incidentally, the decryption processing unit 54 may perform the decryption processing
in step ST52 by omitting the verification processing in step ST51. Also if the re-encrypted
data C
j does not contain the verification data (C
1, C
2X', C
2Y', C
2Z', C
2Z1', C
4, σ), the decryption processing unit 54 performs the decryption processing in step
ST52 by omitting the verification processing in step ST51. The above m may be a key,
instead of a message itself. For example, a shared key key in shared key cryptography
may be set as m=key to replace m with key. In this case, ciphertext obtained by encrypting
a message using the shared key may be added to the ciphertext data or re-encrypted
data. These also apply to embodiments and modifications described later.
[0151] In the present embodiment, the order of processing may be changed when appropriate.
For example, the order of the decryption processing and the ciphertext verification
processing may be changed. Similarly, the order of the re-encryption key generation
processing may be changed to before the encryption processing.
[0152] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the re-encryption key generation key rk
j, the re-encryption key will not be generated without permission of the user of the
decryption device 50 (second user device). In other words, a re-encryption key cannot
be generated if the transfer destination (in the example of FIG. 8, for example, the
user A) does not notify the transfer source (in the example of FIG. 8, the group administrator)
of a re-encryption key generation key. Thus, re-encryption (that is, the transfer
of decryption right of ciphertext to the relevant transfer destination) can be prevented
when there is no approval of the transfer destination and therefore, safe file sharing
can be realized.
[0153] Also according to the present embodiment, due to the configuration of generating
the re-encryption key R
ij based on a random number θ, even if a server and a user collude with each other,
the decryption right can be prevented from being re-transferred without permission
of the transfer source. Accordingly, there is no need to demand extreme reliability
from the server and a file sharing system the user can safely use can be provided.
[0154] To supplement the above description, there has been a problem that, if the server
operator, the user B, and the user E collude, a third party can calculate a normal
re-encryption key (R
AE) to re-encrypt ciphertext for the user A into ciphertext for the user E by using
a re-encryption key (R
AB) to re-encrypt the ciphertext for the user A into ciphertext for the user B, a private
key (sk
B) of the user B, and a private key (sk
E) of the user E without permission of the user A as the transfer source (that is,
the decryption right is re-transferred without permission of the transfer source).
[0155] According to the present embodiment, however, due to the configuration of generating
the re-encryption key R
ij based on the random number θ, even if the server operator, the user B, and the user
E collude, the decryption right can be prevented from being re-transferred without
permission of the transfer source.
[First modification]
[0156] In the first embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the first embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the first embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0157] The difference between the encryption processing in the present modification and
the encryption processing in the first embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0158] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0159] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0160] The verification is successful if the five verification formulas in the formula (a3)
all hold and fails if any one of the five formulas does not hold.
[0161] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0162] The above formula may calculate with

calculated in advance.
[0163] Accordingly, calculation processing loads for decryption can be reduced. This also
applies to embodiments and modifications described later.
[0164] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Second modification]
[0165] In addition to the first modification, as will be described below, the first embodiment
may also be changed to a form in which the ciphertext data is decrypted without being
re-encrypted. Also in this case, only the key setup processing, encryption processing,
and decryption processing need to be performed. The key setup processing and the decryption
processing in the present modification are the same as the key setup processing and
the decryption processing in the first embodiment respectively. Hereinafter, the encryption
processing and the decryption processing in the present modification will be described.
In the present modification, the identification information of the decryption device
50 is assumed to be j.
[0166] Like in step ST21, the encryption parameter generation unit 23 of the encryption
device 20 generates (ssk, svk) (ST21') and sets the verification key svk to the encrypted
data C
1 (C
1=svk).
[0167] The encryption parameter generation unit 23 also generates and sends out five random
numbers r,s,t,k,θ∈Z
p* to the ciphertext generation unit 24.
[0168] The ciphertext generation unit 24 generates encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z, C
3, C
4 below from a message m∈G
T as plaintext data using these random numbers r,s,t,k,θ, the public key pk
j of the decryption device 50, and the public parameter (ST22').

[0169] After step ST22' is completed, like in step ST23, the ciphertext generation unit
24 generates a one-time signature σ (ST23').
[0170] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
j= (C
1, C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2'", C
5X, C
5Y, C
5Z, C
3, C
4, σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0171] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0172] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51 (ST51').
If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j of the local device 50 and the public parameter par to obtain the message m (ST52').

[0173] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0174] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[Third modification]
[0175] In the first embodiment, an example in which the public parameter includes three
elements g, g
1, g
2 of system fixed values is described, but the first embodiment is not limited to such
an example and the element g
2 may not be generated and the element g
2 may not be included in the public parameter. In this case, g
2=g may be set to replace g
2 with g in the first embodiment. This also applies to embodiments and modifications
described later.
[Fourth modification]
[0176] In the first embodiment, an example in which the public parameter includes three
elements g, g
1, g
2 of system fixed values is described, but the first embodiment is not limited to such
an example and four or more elements of system fixed values may be included. If, for
example, four elements g, g
1, g
2, g
6 are included in the public parameter, g
2=g
2g
6 may be set to replace g
2 with g
2g
6 in the first embodiment. If, for example, five elements g, g
1, g
2, g
6, g
7 are included in the public parameter, g
1=g
1g
6 and g
2=g
2g
7 may be set to replace g
1 with g
1g6 and g
2 with g
2g7 in the first embodiment. This also applies to embodiments and modifications described
later.
[Fifth modification]
[0177] In the first embodiment, an example in which one set of (g
3, g
4, g
5) is included in the public parameter is described, but the first embodiment is not
limited to such an example and a plurality of sets of (g
3, g
4, g
5) may be included in the public parameter. This also applies to embodiments and modifications
described later.
[0178] Hereinafter, key setup processing, encryption processing, re-encryption key generation
processing, re-encryption processing, and decryption processing in the present modification
will be described and portions common to the first embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0179] The public parameter generation unit 13 of the key generator 10 randomly selects
n1, π2,..., nN from Z
p* and calculates A
1, A
2,..., AN shown in the following formula.

[0180] N is a natural number. tag
n (n=1,2,...,N) is the identification information of A
n. tag
n may be a numeric value or a character string. Alternatively, an element itself (other
than tag
n) may be used as tag
n. In this case, there is no need to add tag
n as an element of A
n and processing to generate tag
n does not need to be performed.
[0181] The public parameter generation unit 13 generates a public parameter

based on a security parameter λ stored in the key parameter storage unit 11 in advance
or acquires the public parameter from outside (ST1').
[0182] The key generator 10 publishes the public parameter par=(λ,p,G,G
T,g,g
1,g
2,A
1,A
2,...,A
N,u,v,Sig) in the temporary data storage unit 12 (ST2').
[0183] If the identification information of the re-encryption key generator 30 is assumed
to be i, the key generation unit 14 generates a private key x
i,y
i,z
i∈Z
p* of the reencryption key generator 30 and generates a public key pk
i=(X
i,Y
1i,Y
2i,Z
i,Z
1i) of the re-encryption key generator 30 using the private key sk
i=(x
i,y
i,z
i) and the public parameter par.

[0184] When verification processing using a formula (a7') described later is not performed,
data Y
2i may be omitted. That is, the public key pk
i only needs to include data X
i, Y
1i, Z
i, Z
1i.
[0185] Further, the key generation unit 14 generates re-encryption key generation keys rk
i,1, rk
i,2,..., rk
i,N shown by the following formula using the private key sk
i and the public parameter par (ST3').

[0186] The communication unit 15 transmits the private key sk
i and the re-encryption key generation keys rk
i,1, rk
i,2,..., rk
i,N in the temporary data storage unit 12 to the re-encryption key generator 30 under
the control of the control unit 16 (ST4'). Incidentally, the communication unit 15
may transmit, instead of rk
i,1, rk
i,2,..., rk
i,N, (tag
1,rk
i,1), (tag
2,rk
i,2),... , (tag
N,rk
i,N) to the re-encryption key generator 30.
[0187] Similarly, if the identification information of the decryption device 50 is assumed
to be j, the key generation unit 14 generates a private key sk
j=(x
j,y
j,z
j) of the decryption device 50 and generates a public key pk
j=(X
j,Y
1j,Y
2j,Z
j,Z
1j) of the decryption device 50 using the private key sk
j.

[0188] If, similarly as described above, the verification processing using a formula (a7')
described later is not performed, data Y
2j may be omitted. That is, the public key pk
j only needs to include data X
j, Y
1j, Z
j, Z
1j.
[0189] Further, the key generation unit 14 generates re-encryption key generation keys rk
j,1, rk
j,2,..., rk
j,N shown by the following formula using the private key sk
j and the public parameter par (ST6').

[0190] The communication unit 15 transmits the private key sk
j and the re-encryption key generation keys rk
j,1, rk
j,2,..., rk
j,N in the temporary data storage unit 12 to the decryption device 50 under the control
of the control unit 16 (ST7'). Instead of rk
j,1, rk
j,2,..., rk
j,N, the communication unit 15 may transmit, (tag
1, rk
j,1), (tag
2,rk
j,2), ... , (tag
N,rk
j,N) to the decryption device 50.
(2) Encryption processing
[0191] Like in step ST21 in the first embodiment, the encryption parameter generation unit
23 of the encryption device 20 generates a key pair (ssk, svk) of the signature key
ssk and the verification key svk in the one-time signature (ST21') and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0192] The ciphertext generation unit 24 generates one element from A
1, A
2,..., AN as elements of the public parameter par. It is assumed below that A
n is selected.
[0193] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22').

[0194] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the identification information tag
n of A
n and the encrypted data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21' (ST23').

[0195] Incidentally, the ciphertext generation unit 24 may generate the one-time signature
σ for the encrypted data C
3, C
4 as data to be signed without including the identification information tag
n of A
n. This also applies to embodiments and modifications described later.
[0196] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(C
1,C
2X,C
2Y,C
2Z,C
2Z1,C
3,C
4,σ,tag
n) including all the above encrypted data C
1 to C
4, the one-time signature σ, and the identification information tag
n of A
n.
[0197] If the verification processing in step ST41' and step ST51' described later is omitted,
the ciphertext data C
i=(C
1,C
2X,C
2Y,C
2Z,C
2Z1,C
3,C
4,σ) may be set as C
i=(C
2X,C
2Y,C
2Z,C
2Z1,C
3) by omitting verification data (C
1,C
4,σ,tag
n) that is not used for decryption. In this case, processing to generate the verification
data (C
1,C
4,σ) is also omitted. However, if decryption processing in a sixth modification described
later is performed, the ciphertext generation unit 24 adds the identification information
tag
n of A
n to the ciphertext data C
i.
[0198] In any case, the communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to the re-encryption device 40 under the control
of the control unit 25 (ST24').
(3) Re-encryption key generation processing
[0199] Assume that the decryption device 50 (in the example of FIG. 8, for example, the
user A) approves that ciphertext addressed to the re-encryption key generator 30 (in
the example of FIG. 8, the group administrator) and encrypted by using A
n as an element of the public parameter par is re-encrypted into ciphertext addressed
to the decryption device 50 (in the example of FIG. 8, for example, the user A) (that
is, the transfer of decryption right of the ciphertext encrypted by using A
n to the user A). The decryption device 50 transmits the identification information
tag
n of A
n and a re-encryption key generation key rk
j,n of the decryption device 50 to the re-encryption key generator 30. The communication
unit 33 of the re-encryption key generator 30 acquires and writes the identification
information tag
n of A
n and the re-encryption key generation key rk
j,n of the decryption device 50 into the temporary data storage unit 32 under the control
of the control unit 35 (ST31').
[0200] The re-encryption key generation unit 34 generates a re-encryption key R
ij,n as shown in the following formulas using the random number θ, the private key sk
i of the re-encryption key generator 30 in the private key storage unit 31, the identification
information tag
n of A
n and the re-encryption key generation key rk
j,n of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32').

[0201] In the above formulas, g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0202] The re-encryption processing unit 44 verifies the ciphertext data C
i in the temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formula
(ST41').

[0203] If the identification information tag
n of A
n is not included as data to be signed by the one-time signature σ, the fifth verification
formula in the formula (a4) conducts verification of the one-time signature σ by restricting
data to be signed to the encrypted data C
3, C
4. This also applies to verification processing of the one-time signature σ described
later.
[0204] The verification is successful if the five verification formulas in the formula (a4)
all hold and fails if any one of the five formulas does not hold.
[0205] If the verification is successful (or the verification processing in step ST41' is
skipped), the re-encryption parameter generation unit 45 generates and sends out three
random numbers s,t,k∈Z
p* to the re-encryption processing unit 44.
[0206] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s, t, k, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij,n, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42').

[0207] Incidentally, the re-encryption processing unit 44 may select the re-encryption key
R
ij,n to be used in step ST42' based on the identification information tag
n of A
n contained in the ciphertext data C
i transmitted in step ST24'.
[0208] After step ST42' is completed, the re-encryption processing unit 44 replaces encrypted
data C
2X, C
2Y, C
2Z, C
2Z1 in the ciphertext data C
i with all the above re-encrypted data C
2X' to C
5Z and further adds the identification information tag
n of A
n contained in the ciphertext data Ci transmitted in step ST24' to the re-encrypted
data C
j.
That is,
C
j=(C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X,C
5Y,C
5Z,C
3, C
4,σ,tag
n) is obtained. The re-encryption processing unit 44 writes the obtained re-encrypted
data C
j into the temporary data storage unit 42.
[0209] If verification processing in step ST51' in decryption processing described later
is omitted, the re-encrypted data
C
j=(C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X,C
5Y,C
5Z,C
3, C
4,σ,tag
n) may be set as
C
j=(C
2X",C
2Y",C
2Z",C
2Z1",C
5X,C
5Y,C
5Z,C
3) by omitting verification data (C
1,C
2X',C
2Y',C
2Z',C
2Z1',C
4,σ,tag
n) that is not used for decryption. In this case, processing to generate the verification
data (C
2x',C
2Y',C
2Z',C
2Z1') is also omitted.
[0210] In any case, the communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of the control unit 46 (ST43').
(5) Decryption processing
[0211] The decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51').

[0212] Instead of the fifth verification formula in the formula (a7), the following verification
formula may be used.

[0213] Also, instead of the fifth verification formula in the formula (a7), the following
verification formula may be used.

[0214] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0215] Also, instead of the sixth verification formula in the formula (a7), the following
verification formula may be used.

[0216] Also, instead of the sixth verification formula in the formula (a7), the following
verification formula may be used.

[0217] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0218] The decryption processing unit 54 of the decryption device 50 may select, based on
the identification information tag
n of A
n contained in the re-encrypted data C
j transmitted in step ST43', A
n to be used in step ST51' from A
1, A
2,..., AN as elements of the public parameter par.
[0219] The decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j of the local device 50 and the public parameter par to obtain the message m (ST52').

[0220] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0221] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[Sixth modification]
[0222] In the fifth modification, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the first embodiment may also be changed to a form in which
the ciphertext data is decrypted without being re-encrypted. In this case, only the
key setup processing, encryption processing, and decryption processing need to be
performed. The key setup processing in the present modification is the same as the
key setup processing in the fifth modification. Hereinafter, the encryption processing
and the decryption processing in the present modification will be described.
[0223] The difference between the encryption processing in the present modification and
the encryption processing in the fifth modification is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0224] The decryption device 50 verifies, like in step ST51' in the first modification,
the ciphertext data C
j generated by the encryption device 20 (ST51').
[0225] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0226] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0227] The decryption processing unit 54 of the decryption device 50 may select, based on
the identification information tag
n of A
n contained in the ciphertext data Ci transmitted in step ST24', A
n to be used in step ST52' from A
1, A
2,..., AN as elements of the public parameter par.
[Seventh modification]
[0228] In addition to the sixth modification, as will be described below, the first embodiment
may also be changed to a form in which the ciphertext data is decrypted without being
re-encrypted. Also in this case, only the key setup processing, encryption processing,
and decryption processing need to be performed. The key setup processing and the decryption
processing in the present modification are the same as the key setup processing and
the decryption processing in the fifth modification respectively. Hereinafter, the
encryption processing and the decryption processing in the present modification will
be described. In the present modification, the identification information of the decryption
device 50 is assumed to be j.
[0229] Like in step ST21 in the first embodiment, the encryption parameter generation unit
23 of the encryption device 20 generates (ssk, svk) (ST21') and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0230] The ciphertext generation unit 24 generates one element from A
1, A
2,..., AN as elements of the public parameter par. It is assumed below that A
n is selected.
[0231] The encryption parameter generation unit 23 also generates and sends out five random
numbers r,s,t,k,θ∈Z
p* to the ciphertext generation unit 24.
[0232] The ciphertext generation unit 24 generates encrypted data C
2X",C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X, C
5Y,C
5Z,C
3,C
4 below from a message m∈G
T as plaintext data using these random numbers r,s,t,k,θ, the public key pk
j of the decryption device 50, and the public parameter (ST22').

[0233] After step ST22' is completed, like in step ST23 in the fifth modification, the ciphertext
generation unit 24 generates a one-time signature σ (ST23').
[0234] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
j=(C
1,C
2X',C
2X",C
2Y',C
2Y", C
2Z",C
2Z",C
2Z1',C
2Z1",C
5X, C
5Y,C
5Z,C
3,C
4,σ,tag
n) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0235] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0236] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51' in the
fifth modification (ST51').
[0237] The decryption processing unit 54 of the decryption device 50 may select, based on
the identification information tag
n of A
n contained in the ciphertext data C
i transmitted in step ST24', A
n to be used in step ST51' from A
1, A
2,..., AN as elements of the public parameter par.
[0238] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j of the local device 50 and the public parameter par to obtain the message m (ST52').

[0239] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0240] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

(Second embodiment)
[0241] In the present embodiment, an example of updating a re-encryption key in the first
embodiment at certain intervals will be described. A time parameter L is used as a
parameter representing a period. The time parameter is used in, of key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing, the encryption processing, the re-encryption key generation
processing, and the re-encryption processing. The time parameter is used such that
if, for example, encryption processing is performed in a certain period t
1, the encryption processing described later is performed by setting L=t
1 and if encryption processing is performed in the next period t
2, the encryption processing described later is performed by setting L=t
2. That is, encryption processing, re-encryption key generation processing, and re-encryption
processing are performed by periodically changing the time parameter. Hereinafter,
key setup processing, encryption processing, re-encryption key generation processing,
re-encryption processing, and decryption processing in the present embodiment will
be described. Portions common to the aforementioned first embodiment may or may not
be described by using the same reference signs.
(1) Key setup processing
[0242] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the first embodiment or acquires the parameter from outside
(ST1). If the identification information of a re-encryption key generator 30 is i,
a key generation unit 14 randomly selects elements x
i, y
i, z
i, w
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i,w
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=(X
i,Y
1i,Y
2i,Z
i,Z
1i,W
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0243] When verification processing using a formula (a6') described later is not performed,
data Y
2i may be omitted. That is, the public key pk
i only needs to include X
i, Y
1i, Z
i, Z
1i, W
i.
[0244] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
5i) using the private key sk
i and the public parameter par (ST3).

[0245] Similarly, if the identification information of a decryption device 50 is j, the
key generation unit 14 randomly selects elements x
j, y
j, z
j, w
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j,z
j,w
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Y
2j,Z
j,Z
1j,W
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0246] If, similarly as described above, the verification processing using a formula (a6')
described later is not performed, data Y
2j may be omitted. That is, the public key pk
j only needs to include X
j, Y
1j, Z
j, Z
1j, W
j.
[0247] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y5j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0248] Like in step ST21 in the first embodiment, an encryption parameter generation unit
23 of an encryption device 20 generates (ssk, svk) (ST21) and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0249] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to a ciphertext generation unit 24.
[0250] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, the public parameter par, and the time parameter
L (ST22).

[0251] The function Fi (L) is defined as shown below.

[0252] As a method of acquiring the time parameter by the encryption device 20 (or the re-encryption
key generator 30 described later), for example, the following method may be used.
Some entity (for example, a server Sv in FIG. 8, a server separate from the server
Sv, a user administrator, a group administrator, an administrator separate from the
user administrator and the group administrator, a user A, a user B, a user B, or a
user separate from the users A to C) holds a time parameter generation device (not
shown) that generates a time parameter and the time parameter generation device notifies
the encryption device 20 (or the re-encryption key generator 30) of a time parameter.
Alternatively, a function in which the input is a time and the output is a time parameter
may be defined to generate a time parameter using the time and the function. In this
case, the encryption device 20 (or the re-encryption key generator 30) may use an
output value of the function using, as input, information based on the time when encryption
processing (re-encryption key generation processing) is performed (for example, a
value obtained by converting the date when encryption processing (re-encryption key
generation processing) is performed into a number) as a time parameter L, which obviates
the need to acquire a time parameter from another device. Alternatively, the key generator
10, the encryption device 20, the re-encryption key generator 30, a re-encryption
device 40, or the decryption device 50 may generate a time parameter to notify devices
other than the relevant device (that has generated the time parameter) of the time
parameter. The re-encryption key generator 30 acquires, as will be described later,
a re-encryption key generation key of the decryption device 50 from the decryption
device 50 and when acquiring the re-encryption key generation key, may also acquire
a time parameter from the decryption device 50. In this case, the decryption device
50 may acquire a time parameter from one of the above methods. This also applies to
embodiments and modifications described later.
[0253] The time parameter does not necessarily have to be a parameter related to a time
such as a time or date and may be, for example, a number obtained by converting a
character string or a numerical value such as a random number. Similarly, the input
into the above function may be a number obtained by converting a character string
or a numerical value such as a random number. Thus, the value of a time parameter
may be unrelated to time. This also applies to embodiments and modifications described
later.
[0254] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the time parameter L and the encrypted
data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21 (ST23).

[0255] Incidentally, the ciphertext generation unit 24 may generate the one-time signature
σ for the encrypted data C
3, C
4 as data to be signed without including the time parameter L. This also applies to
embodiments and modifications described later.
[0256] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(L,C
1,C
2X, C
2Y, C
2Z,C
2Z1,C
2F,C
3, C
4,σ) including the time parameter L, all the above encrypted data C
1 to C
4, and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
[0257] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to the re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0258] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0259] A random number generation unit 36 generates and sends out three random numbers θ,δx,δy∈Z
p* to a re-encryption key generation unit 34.
[0260] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random numbers θ, δx, δy, the private
key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32).
R
ijL=(R
ijL1,R
ijL2,R
ijL3,R
ijL4,R
ijL5)

[0261] In the above formulas, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0262] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formula
(ST41).

[0263] If the time parameter L is not included as data to be signed by the one-time signature
σ, the sixth verification formula in the formula (a5) conducts verification of the
one-time signature σ by restricting data to be signed to the encrypted data C
3, C
4. This also applies to verification processing of the one-time signature σ described
later.
[0264] The verification is successful if the six verification formulas in the formula (a5)
all hold and fails if any one of the six formulas does not hold.
[0265] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out four
random numbers s,t,k,h∈Z
p* to the re-encryption processing unit 44.
[0266] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z" C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5FX, C
5FY using these random numbers s, t, k, h, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0267] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(L,C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
2F',C
2F",C
5 x,C
5Y,C
5Z,C
5FX,C
5FY,C
3,C
4,σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F in the ciphertext data C
i with all the above re-encrypted data C
2X' to C
5FY and writes the obtained ciphertext data C
j into the temporary data storage unit 42.
[0268] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0269] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0270] Instead of the sixth verification formula in the formula (a6), the following verification
formula may be used.

[0271] Also, instead of the sixth verification formula in the formula (a6), the following
verification formula may be used.

[0272] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0273] Also, instead of the seventh verification formula in the formula (a6), the following
verification formula may be used.

[0274] Also, instead of the seventh verification formula in the formula (a6), the following
verification formula may be used.

[0275] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0276] The verification is successful if the eight verification formulas in the formula
(a6) all hold and fails if any one of the eight formulas does not hold.
[0277] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0278] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0279] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0280] In the present embodiment, the order of processing may be changed when appropriate.
For example, the order of the decryption processing and the ciphertext verification
processing may be changed. Similarly, the order of the re-encryption key generation
processing may be changed to before the encryption processing.
[0281] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random numbers θ, δx, δy, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the first embodiment, whether
to transfer the decryption right can be decided in each period so that finer access
control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system whose convenience is further improved can be provided.
[Eighth modification]
[0282] In the second embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the second embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the second embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0283] The difference between the encryption processing in the present modification and
the encryption processing in the second embodiment is in the last step only. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0285] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0286] The verification is successful if the six verification formulas shown above all hold
and fails if any one of the six formulas does not hold.
[0287] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0288] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Ninth modification]
[0289] In addition to the eighth modification, as will be described below, the second embodiment
may also be changed to a form in which the ciphertext data is decrypted without being
re-encrypted. Also in this case, only the key setup processing, encryption processing,
and decryption processing need to be performed. The key setup processing and the decryption
processing in the present modification are the same as the key setup processing and
the decryption processing in the second embodiment respectively. Hereinafter, the
encryption processing and the decryption processing in the present modification will
be described. In the present modification, the identification information of the decryption
device 50 is assumed to be j.
[0290] Like in step ST21 in the first embodiment, the encryption parameter generation unit
23 of the encryption device 20 generates (ssk, svk) (ST21') and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0291] The encryption parameter generation unit 23 also generates and sends out eight random
numbers r,s,t,k,h, θ,δx,δy∈Z
p* to the ciphertext generation unit 24.
[0292] The ciphertext generation unit 24 generates encrypted data C
2X', C
2x'', C
2Y', C
2Y", C
2Z', C
2Z",C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5FX, C
5FY, C
3, C
4 below from a message m∈G
T as plaintext data using these random numbers r, s, t, k, h, θ, δx, δy, the public
key pk
j of the decryption device 50, the public parameter, and the time parameter L (ST22').

[0293] After step ST22' is completed, like in step ST23, the ciphertext generation unit
24 generates a one-time signature σ.
[0294] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(L, C
1, C
2X', C
2X'', C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5F, C
5FY, C
3, C
4, σ) including the time parameter L, all the above encrypted data C
1 to C
4 and, the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0295] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0296] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51 (ST51').
If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j and the public parameter par to obtain the message m (ST52').

[0297] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0298] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

(Third embodiment)
[0299] In the present embodiment, an example of omitting the encryption function shown in
the second modification in the first embodiment will be described. Hereinafter, key
setup processing, encryption processing, re-encryption key generation processing,
re-encryption processing, and decryption processing in the present embodiment will
be described. Portions common to the aforementioned first embodiment may or may not
be described by using the same reference signs.
(1) Key setup processing
[0300] First, a public parameter generation unit 13 of a key generator 10 generates a public
parameter

based on a security parameter λ stored in a key generation parameter storage unit
11 in advance or acquires the public parameter from outside (ST1).
[0301] Here, g
3=g
π and g
4=g
1π.
[0302] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i, z
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=(X
i,Y
1i,Z
i,Z
1i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0303] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
2i) using the private key sk
i and the public parameter par (ST3).

[0304] Similarly, if the identification information of a decryption device 50 is j, the
key generation unit 14 randomly selects elements x
j, y
j, z
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j,z
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Z
j,Z
1j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0305] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y
2j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0306] Like in step ST21 in the first embodiment, an encryption parameter generation unit
23 of an encryption device 20 generates (ssk, svk) (ST21) and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0307] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to a ciphertext generation unit 24.
[0308] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0309] After step ST22 is completed, like in step ST23 in the first embodiment, the ciphertext
generation unit 24 generates a one-time signature σ for the encrypted data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21 (ST23).
[0310] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(C
1,C
2X, C
2Y, C
2Z,C
2Z1,C
3,C
4,σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
[0311] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0312] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0313] A random number generation unit 36 generates and sends out a random number θ∈Z
p* to a re-encryption key generation unit 34.
[0314] The re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas using the random number θ, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).
R
ij=(R
ij1,R
ij2,R
ij3)

[0315] In the above formulas, g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0317] The verification is successful if the five verification formulas shown above all
hold and fails if any one of the five formulas does not hold.
[0318] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out three
random numbers s,t,k∈Z
p* to the re-encryption processing unit 44.
[0319] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z",C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s, t, k, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0320] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X,C
5Y,C
5Z,C
3, C
4,σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1 in the ciphertext data C
i with all the above re-encrypted data C
2X' to C
5Z and writes the obtained re-encrypted data C
j into the temporary data storage unit 42.
[0321] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0322] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0323] Instead of the sixth verification formula in the formula (b1), the following verification
formula may be used.

[0324] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0325] The verification is successful if the seven verification formulas in the formula
(b1) all hold and fails if any one of the seven formulas does not hold.
[0326] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0327] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0328] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0329] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the random number θ and the re-encryption key generation key rk
j, effects similar to those in the first embodiment can be obtained.
[0330] Also according to the present embodiment, as described above, due to the configuration
of omitting g
5 in the first embodiment, the data size of the public parameter and public key can
be reduced when compared with the embodiment shown in the first embodiment. Also according
to the present embodiment, the amount of computations needed for key setup processing
can be reduced when compared with the embodiment shown in the first embodiment.
[Tenth modification]
[0331] In the third embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the third embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the third embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0332] The difference between the encryption processing in the present modification and
the encryption processing in the third embodiment is in the last step only. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0333] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0334] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0335] The verification is successful if the five verification formulas in the formula (b2)
all hold and fails if any one of the five formulas does not hold.
[0336] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0337] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Fourth embodiment)
[0338] In the present embodiment, an example of updating a re-encryption key in the third
embodiment at certain intervals will be described. Hereinafter, key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing in the present embodiment will be described. Portions common
to the aforementioned first embodiment or second embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0339] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the third embodiment or acquires the parameter from outside
(ST1). If the identification information of a re-encryption key generator 30 is i,
a key generation unit 14 randomly selects elements x
i, y
i, z
i, w
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i,w
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=(X
i,Y
1i,Z
i,Z
1i,W
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0340] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
2i) using the private key sk
i and the public parameter par (ST3).

[0341] Similarly, if the identification information of a decryption device 50 is j, the
key generation unit 14 randomly selects elements x
j, y
j, z
j, w
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,t
j,z
j,w
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Z
j,Z
1j,W
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0342] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y
2j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0343] Like in step ST21 in the first embodiment, an encryption parameter generation unit
23 of an encryption device 20 generates (ssk, svk) (ST21) and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0344] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to a ciphertext generation unit 24.
[0345] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1), C
2F,C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, the public parameter par, and a time parameter
L (ST22).

[0346] The function Fi (L) is defined as shown below.

[0347] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the time parameter L and the encrypted
data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21 (ST23).

[0348] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(L,C
1,C
2X, C
2Y, C
2Z,C
2Z1,C
2F,C
3, C
4,σ) including the time parameter L, all the above encrypted data C
1 to C
4, and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
[0349] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0350] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0351] A random number generation unit 36 generates and sends out three random numbers θ,δx,δy∈Z
p* to a re-encryption key generation unit 34.
[0352] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random numbers θ, δx, δy, the private
key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32).
R
ijL= (R
ijL1,R
ijL2,R
ijL3,R
ijL4,R
ijL5)

[0353] In the above formulas, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0354] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0355] The verification is successful if the six verification formulas shown above all hold
and fails if any one of the six formulas does not hold.
[0356] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out four
random numbers s,t,k,h∈Z
p* to the re-encryption processing unit 44.
[0357] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5FX, C
5FY using these random numbers s,t,k,h, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0358] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data Cj= (L,C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
2F',C
2F",C
5 X,C
5Y,C
5Z,C
5FX,C
5FY,C
3,C
4,σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F in the ciphertext data C
i with all the above re-encrypted data C
2X' to C
5FY and writes the obtained ciphertext data into the temporary data storage unit 42.
[0359] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0360] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0361] Instead of the seventh verification formula in the formula (b3), the following verification
formula may be used.

[0362] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0363] The verification is successful if the eight verification formulas in the formula
(b3) all hold and fails if any one of the eight formulas does not hold.
[0364] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0365] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0366] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0367] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random numbers θ, δ
x, δ
y, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the third embodiment, whether
to transfer the decryption right can be decided in each period so that finer access
control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system the convenience of which is further improved can be provided.
[0368] Also according to the present embodiment, as described above, due to the configuration
of omitting g
5 in the second embodiment, the data size of the public parameter and public key can
be reduced when compared with the embodiment shown in the second embodiment. Also
according to the present embodiment, the amount of computations needed for key setup
processing can be reduced when compared with the embodiment shown in the second embodiment.
[Eleventh modification]
[0369] In the fourth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the fourth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the fourth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0370] The difference between the encryption processing in the present modification and
the encryption processing in the fourth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0372] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0373] The verification is successful if the six verification formulas shown above all hold
and fails if any one of the six formulas does not hold.
[0374] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0375] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Fifth embodiment)
[0376] In the present embodiment, an example in which the server and users are honest entities
and there is no possibility of collusion of a plurality of entities in the first embodiment
will be described. Hereinafter, key setup processing, encryption processing, re-encryption
key generation processing, re-encryption processing, and decryption processing in
the present embodiment will be described. Portions common to the aforementioned first
embodiment may or may not be described by using the same reference signs.
(1) Key setup processing
[0377] First, a public parameter generation unit 13 of a key generator 10 generates a public
parameter based on a security parameter λ stored in a key parameter storage unit 11
in advance or acquires the parameter from outside (ST1).

[0378] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects an element x
i of Z
p* from Z
p* and sets a private key sk
i=x
i of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=X
i of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0379] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=X
1i using the private key sk
i and the public parameter par (ST3).

[0380] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects an element x
j of Z
p* from Z
p* and sets a private key sk
j=x
j of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=X
j of the decryption device 50 using the private key sk
j and the public parameter par.

[0381] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=X
1j using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0382] Like in step ST21 in the first embodiment, an encryption parameter generation unit
23 of an encryption device 20 generates (ssk, svk) (ST21) and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0383] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to a ciphertext generation unit 24.
[0384] The ciphertext generation unit 24 generates encrypted data C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0385] After step ST22 is completed, like in step ST23 in the first embodiment, the ciphertext
generation unit 24 generates a one-time signature σ for the encrypted data C
3, C
4 based on a signature generation function Ŝ of the public parameter par and the signature
key ssk generated in step ST21 (ST23).
[0386] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(C
1,C
2,C
3,C
4,σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
[0387] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0388] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0389] Because there is no need to generate a random number for the generation of a re-encryption
key in the present embodiment, a random number generation unit 36 of the re-encryption
key generator 30 is not needed.
[0390] A re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas using the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).

(4) Re-encryption processing
[0391] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0392] The verification is successful if both verification formulas shown above hold and
fails if any one of the two formulas does not hold.
[0393] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out a random
number t∈Z
p* to the re-encryption processing unit 44.
[0394] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2', C
2", C2'" using the random number t, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0395] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(C
1,C
2',C
2",C
2'",C
3,C
4,σ) by replacing the encrypted data C
2 in the ciphertext data C
i with all the above re-encrypted data C
2' to C
2'" and writes the obtained re-encrypted data C
j into the temporary data storage unit 42.
[0396] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0397] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0398] Instead of the first verification formula in the formula (c1), the following verification
formula may be used.

[0399] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0400] The verification is successful if the three verification formulas in the formula
(c1) all hold and fails if any one of the three formulas does not hold.
[0401] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0402] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0403] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the re-encryption key generation key rk
j, the re-encryption key cannot be generated if the transfer destination (in the example
of FIG. 8, for example, the user A) does not notify the transfer source (in the example
of FIG. 8, the group administrator) of the re-encryption key generation key and therefore,
re-encryption (that is, the transfer of ciphertext to the relevant transfer destination)
without approval of the transfer destination can be prevented.
[0404] Also according to the present embodiment, as described above, due to the configuration
of omitting g
2 to g
5 in the first embodiment, the data size of the public parameter, public key, re-encryption
key generation key, re-encryption key, private key, ciphertext data, and re-encrypted
data can be reduced when compared with the embodiment shown in the first embodiment.
Also according to the present embodiment, the amount of computations needed for key
setup processing, encryption processing, re-encryption key generation processing,
re-encryption processing, and decryption processing can be reduced when compared with
the embodiment shown in the first embodiment.
[Twelfth modification]
[0405] In the fifth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the fifth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the fifth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0406] The difference between the encryption processing in the present modification and
the encryption processing in the fifth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0407] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0408] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0409] The verification is successful if both verification formulas in the formula (c2)
hold and fails if any one of the two formulas does not hold.
[0410] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0411] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Thirteenth modification]
[0412] In addition to the twelfth modification, as will be described below, the fifth embodiment
may also be changed to a form in which the ciphertext data is decrypted without being
re-encrypted. Also in this case, only the key setup processing, encryption processing,
and decryption processing need to be performed. The key setup processing and the decryption
processing in the present modification are the same as the key setup processing and
the decryption processing in the fifth embodiment respectively. Hereinafter, the encryption
processing and the decryption processing in the present modification will be described.
In the present modification, the identification information of the decryption device
50 is assumed to be j.
[0413] Like in step ST21 in the first embodiment, the encryption parameter generation unit
23 of the encryption device 20 generates (ssk, svk) (ST21') and sets the verification
key svk to the encrypted data C
1 (C
1=svk).
[0414] The encryption parameter generation unit 23 also generates and sends out two random
numbers r,t∈Z
p* to the ciphertext generation unit 24.
[0415] The ciphertext generation unit 24 generates encrypted data C
2', C
2",C
2'",C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers r, t, the public key pk
j of the decryption device 50, and the public parameter (ST22').

[0416] After step ST22' is completed, the ciphertext generation unit 24 generates a one-time
signature σ in the same manner as in step ST23 (ST23').
[0417] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
j= (C
1,C
2',C
2",C
2'",C
3,C
4,σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0418] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0419] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51 in the fifth
embodiment (ST51').
[0420] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j of the local device 50 and the public parameter par to obtain the message m (ST52').

[0421] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Sixth embodiment)
[0422] In the present embodiment, an example of updating a re-encryption key in the fifth
embodiment at certain intervals will be described. Hereinafter, key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing in the present embodiment will be described. Portions common
to the aforementioned first embodiment or second embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0423] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the fifth embodiment or acquires the parameter from outside
(ST1). If the identification information of a re-encryption key generator 30 is i,
a key generation unit 14 randomly selects elements x
i, y
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=(X
i,Y
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0424] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=X
1i using the private key sk
i and the public parameter par (ST3).

[0425] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0426] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=X
1j using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0427] Like in step ST21 in the first embodiment, an encryption parameter generation unit
23 of an encryption device 20 generates (ssk, svk) (ST21) and sets the verification
key svk to the encrypted data C
0 (C
0=svk).
[0428] The encryption parameter generation unit 23 also generates and sends out a random
number s∈Z
p* to a ciphertext generation unit 24.
[0429] The ciphertext generation unit 24 generates encrypted data C
1, C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random number s, the public key pk
i of the re-encryption key generator 30, the public parameter par, and a time parameter
L (ST22).

[0430] The function F
i (L) is defined as shown below.

[0431] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ for the time parameter L and the encrypted data C
3, C
4 based on a signature generation function S of the public parameter par and the signature
key ssk generated in step ST21 (ST23).

[0432] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i= (L, C
0,C
1,C
2,C
3,C
4,σ) including the time parameter L, all the above encrypted data C
0 to C
4 and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
[0433] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0434] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0435] A random number generation unit 36 generates and sends out a random number r∈Z
p* to a re-encryption key generation unit 34.
[0436] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random number r, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32). R
ijL= (A
ijL,B
ijL)

(4) Re-encryption processing
[0437] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0438] The verification is successful if the three verification formulas shown above all
hold and fails if any one of the three formulas does not hold.
[0439] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out two
random numbers t
1, t
2∈Z
p* to the re-encryption processing unit 44.
[0440] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
1', C
1", C
1"', C
2', C
2", C
2'" using the random numbers t
1, t
2, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0441] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j= (L,C
0,C
1',C
1",C
1'",C
2',C
2",C
2'",C
3,C
4,σ) by replacing the encrypted data C
1, C
2 in the ciphertext data C
i with all the above re-encrypted data C
1' to C
2'" and writes the obtained ciphertext data into the temporary data storage unit 42.
[0442] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0443] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0444] Instead of the third verification formula in the formula (c3), the following verification
formula may be used.

[0445] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0446] The verification is successful if the four verification formulas in the formula (c3)
all hold and fails if any one of the four formulas does not hold.
[0447] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0448] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0449] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random number r, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the fifth embodiment, whether
to transfer the decryption right can be decided in each period so that finer access
control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system whose convenience is further improved can be provided.
[0450] Also according to the present embodiment, as described above, due to the configuration
of omitting g
2 to g
5 in the second embodiment, the data size of the public parameter, public key, re-encryption
key generation key, re-encryption key, private key, ciphertext data, and re-encrypted
data can be reduced when compared with the embodiment shown in the second embodiment.
Also according to the present embodiment, the amount of computations needed for key
setup processing, encryption processing, re-encryption key generation processing,
re-encryption processing, and decryption processing can be reduced when compared with
the embodiment shown in the second embodiment.
[Fourteenth modification]
[0451] In the sixth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the sixth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the sixth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0452] The difference between the encryption processing in the present modification and
the encryption processing in the sixth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0453] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0454] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0455] The verification is successful if the three verification formulas in the formula
(c4) all hold and fails if any one of the three formulas does not hold.
[0456] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0457] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Fifteenth modification]
[0458] In addition to the fourteenth modification, as will be described below, the sixth
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the sixth embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0459] Like in step ST21 in the first embodiment, the encryption parameter generation unit
23 of the encryption device 20 generates (ssk, svk) (ST21') and sets the verification
key svk to the encrypted data C
0 (C
0=svk).
[0460] The encryption parameter generation unit 23 also generates and sends out two random
numbers t
1, t
2∈Z
p* to the ciphertext generation unit 24.
[0461] The ciphertext generation unit 24 generates encrypted data C
1', C
1", C
1'", C
2', C
2",C
2'", C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers t
1, t
2, the public key pk
j of the decryption device 50, the public parameter, and the time parameter L (ST22').

[0462] After step ST22' is completed, the ciphertext generation unit 24 generates a one-time
signature σ in the same manner as in step ST23.
[0463] Thereafter, the ciphertext generation unit 24 generates ciphertext data
C
j= (L, Co, C
1'C
1", C
1'",C
2',C
2",C
2'",C
3,C
4,σ) including the time parameter L, all the above encrypted data C
0 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0464] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0465] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51 (ST51').
If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j and the public parameter par to obtain the message m (ST52').

[0466] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Seventh embodiment)
[0467] In the present embodiment, an example of omitting a one-time signature in the first
embodiment will be described. Hereinafter, key setup processing, encryption processing,
re-encryption key generation processing, re-encryption processing, and decryption
processing in the present embodiment will be described. Portions common to the aforementioned
first embodiment may or may not be described by using the same reference signs.
(1) Key setup processing
[0468] First, a public parameter generation unit 13 of a key generator 10 generates a public
parameter

based on a security parameter λ stored in a key parameter storage unit 11 in advance
or acquires the parameter from outside (ST1).
[0469] Here, g
3 is rewritten and denoted by g
π, g
4 is rewritten and denoted by g
1π, and g
5 is rewritten and denoted by g
2π. H is a hash function defined by the following formula.

[0470] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i, z
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=(X
i,Y
1i,Y
2i,Z
i,Z
1i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0471] If verification processing using a formula (d3) described later is not performed,
data Y
2i may be omitted. That is, the public key pk
i only needs to include data X
i, Y
1i, Z
i, Z
1i.
[0472] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
5i) using the private key sk
i and the public parameter par (ST3).

[0473] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j, z
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j,z
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Y
2j,Z
j,Z
1j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0474] If, similarly as described above, the verification processing using a formula (d3)
described later is not performed, data Y
2j may be omitted. That is, the public key pk
j only needs to include data X
j, Y
1j, Z
j, Z
1j.
[0475] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y
5j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0476] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0477] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number r∈Z
p* to a ciphertext generation unit 24.
[0478] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0479] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i=(C
2X,C
2Y,C
2Z,C
2Z1,C
3,C
4) including all the above encrypted data C
2X to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0480] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0481] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0482] A random number generation unit 36 generates and sends out a random number θ∈Z
p* to a re-encryption key generation unit 34.
[0483] The re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas using the random number θ, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).
R
ij= (R
ij1, R
ij2, R
ij3)

[0484] In the above formulas, g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0485] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0486] The verification is successful if the four verification formulas shown above all
hold and fails if any one of the four formulas does not hold.
[0487] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out three
random numbers s,t,k∈Z
p* to the re-encryption processing unit 44.
[0488] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s,t,k, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0489] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data Cj=(C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
2X,C
2Y,C
2Z,C
2Z1,C
3 ,C
4,C
5X,C
5Y,C
5Z,i) by adding all the above re-encrypted data C
2X' to C
5Z and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained re-encrypted data C
j into the temporary data storage unit 42.
[0490] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0491] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0492] Instead of the fifth verification formula in the formula (d1), the following verification
formula may be used.

[0493] Also, instead of the fifth verification formula in the formula (d1), the following
verification formula may be used.

[0494] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0495] Also, instead of the sixth verification formula in the formula (d1), the following
verification formula may be used.

[0496] Also, instead of the sixth verification formula in the formula (d1), the following
verification formula may be used.

[0497] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0498] The verification is successful if the 10 verification formulas in the formula (d1)
all hold and fails if any one of the 10 formulas does not hold.
[0499] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0500] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0501] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0502] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the random number θ and the re-encryption key generation key rk
j, effects similar to those in the first embodiment can be obtained.
[0503] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the first embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the first embodiment. Also according to the present embodiment, the amount of computations
needed for encryption processing and re-encryption processing can be reduced when
compared with the embodiment shown in the first embodiment.
[Sixteenth modification]
[0504] In the seventh embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the seventh embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the seventh embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0505] The difference between the encryption processing in the present modification and
the encryption processing in the seventh embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0506] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0507] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0508] The verification is successful if the four verification formulas in the formula (d6)
all hold and fails if any one of the four formulas does not hold.
[0509] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0510] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Seventeenth modification]
[0511] In addition to the sixteenth modification, as will be described below, the seventh
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the seventh embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0512] No one-time signature is used in the present embodiment either and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
The encryption parameter generation unit 23 of the encryption device 20 generates
and sends out five random numbers r,s,t,k,θ∈Z
p* to the ciphertext generation unit 24.
[0513] The ciphertext generation unit 24 generates encrypted data C
2X', C
2X", C
2Y' C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4, C
5X, C
5Y, C
5Z below from a message m∈G
T as plaintext data using the random numbers r,s,t,k,θ, the public key pk
j of the decryption device 50, and the public parameter (ST22').

[0514] After step ST22' is completed, the ciphertext generation unit 24 generates ciphertext
data C
j=(C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
2X,C
2Y,C
2Z,C
2Z1,C
3 ,C
4,C
5X,C
5Y,C
5Z,j) including all the above encrypted data C
2X' to C
5Z and the identification information j of the decryption device 50 and writes the obtained
ciphertext data into the temporary data storage unit 21.
[0515] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0516] The decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(formula (d7)) (ST51').
[0517] In step ST51', as will be described later, the decryption processing unit 54 may
use the public key pk
j of the decryption device 50 identified by the identification information j of the
re-encryption key degeneration device 30 contained in the re-encrypted data C
j in the temporary data storage unit 52. This also applies to embodiments and modifications
described later.

[0519] The verification is successful if the 10 verification formulas in the formula (d7)
all hold and fails if any one of the 10 formulas does not hold.
[0520] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52').

[0521] That the decryption result of the above formula produces m can be checked by the
following calculation. In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

(Eighth embodiment)
[0522] In the present embodiment, an example of updating a re-encryption key in the seventh
embodiment at certain intervals will be described. Hereinafter, key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing in the present embodiment will be described. Portions common
to the aforementioned first embodiment or second embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0523] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the seventh embodiment or acquires the parameter from
outside (ST1). H is a hash function defined by the following formula.

[0524] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i, z
i, w
i of Z
p* from Z
p* and sets a private key sk
i=(x
i,y
i,z
i,w
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pki=(X
i,Y
1i,Y
2i,Z
i,Z
1i,W
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0525] If verification processing using a formula (d10) described later is not performed,
data Y
2i may be omitted. That is, the public key pk
i only needs to include data X
i, Y
1i, Z
i, Z
1i, W
i.
[0526] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=(X
3i,Y
5i) using the private key sk
i and the public parameter par (ST3).

[0527] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j, z
j, w
j of Z
p* from Z
p* and sets a private key sk
j=(x
j,y
j,z
j,w
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j=(X
j,Y
1j,Y
2j,Z
j,Z
1j,W
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0528] If, similarly as described above, the verification processing using a formula (d10)
described later is not performed, data Y
2j may be omitted. That is, the public key pk
j only needs to include data X
j, Y
1j, Z
j, Z
1j, W
j.
[0529] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=(X
3j,Y
5j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0530] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0531] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number r∈Z
p* to a ciphertext generation unit 24.
[0532] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, the public parameter par, and a time parameter
L (ST22).

[0533] Incidentally, the ciphertext generation unit 24 may not include the time parameter
L as input into the hash function H. That is, instead of H (L, C
2X,C
2Y,C
2Z,C
2Z1,C
2F,C
3), H(C
2X,C
2Y,C
2Z,C
2Z1,C
2F,C
3) may be calculated. This also applies to embodiments and modifications described
later.
[0534] The function F
i (L) is defined as shown below.

[0535] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i= (L, C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4) including the time parameter L and all the above encrypted data C
2X to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0536] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0537] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0538] A random number generation unit 36 generates and sends out three random numbers θ,
δ
x, δ
y∈Z
p* to a re-encryption key generation unit 34.
[0539] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random numbers θ, δ
x, δ
y, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32).

[0540] In the above formulas, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0541] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0542] If the time parameter L is not contained as input into the hash function H, instead
of H (L, C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3), H (C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3) is calculated for the verification. This also applies to verification processing
of ciphertext data or re-encrypted data described below.
[0543] The verification is successful if the five verification formulas shown above all
hold and fails if any one of the five formulas does not hold.
[0544] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out four
random numbers s, t, k, h∈Z
p* to the re-encryption processing unit 44.
[0545] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5XF, C
5FY using these random numbers s, t, k, h, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0546] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data Cj= (L C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F' C
2F", C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4, C
5X, C
5Y, C
5Z, C
5FX, C
5FY, i) by adding all the above re-encrypted data C
2X' to C
5FY and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained ciphertext data into the temporary data storage unit 42.
[0547] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0548] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0549] Instead of the sixth verification formula in the formula (d8), the following verification
formula may be used.

[0550] Also, instead of the sixth verification formula in the formula (d8), the following
verification formula may be used.

[0551] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0552] Instead of the seventh verification formula in the formula (d8), the verification
formula (d11) or (d12) may be used.

[0553] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0554] The verification is successful if the 12 verification formulas in the formula (d8)
all hold and fails if any one of the 12 formulas does not hold.
[0555] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0556] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0557] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0558] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random numbers θ, δ
x, δ
y, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the seventh embodiment,
whether to transfer the decryption right can be decided in each period so that finer
access control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system whose convenience is further improved can be provided.
[0559] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the second embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the second embodiment. Also according to the present embodiment, the amount of
computations needed for encryption processing and re-encryption processing can be
reduced when compared with the embodiment shown in the second embodiment.
[Eighteenth modification]
[0560] In the eighth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the eighth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the eighth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0561] The difference between the encryption processing in the present modification and
the encryption processing in the eighth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0562] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0563] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0564] The verification is successful if the five verification formulas in the formula (d13)
all hold and fails if any one of the five formulas does not hold.
[0565] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0566] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Nineteenth modification]
[0567] In addition to the eighteenth modification, as will be described below, the eighth
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the eighth embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0568] No one-time signature is used in the present embodiment either and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
The encryption parameter generation unit 23 of the encryption device 20 generates
and sends out eight random numbers r, s, t, k, h, θ, δ
x, δ
y∈Z
p* to the ciphertext generation unit 24.
[0569] The ciphertext generation unit 24 generates encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4, C
5X, C
5Y, C
5Z, C
5FX, C
5FY below from a message m
∈G
T as plaintext data using the random numbers r, s, t, k, h, θ, δ
x, δ
y, the public key pk
j of the decryption device 50, the public parameter, and the time parameter L (ST22').

[0570] After step ST22' is completed, the ciphertext generation unit 24 generates ciphertext
data C
j= (L- C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4, C
5X, C
5Y, C
5Z, C
5FX, C
5FY, j) including the time parameter L, all the above encrypted data C
2X' to C
5FY and the identification information j of the decryption device 50 and writes the obtained
ciphertext data into the temporary data storage unit 21.
[0571] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0572] The decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51').

[0574] The verification is successful if the 12 verification formulas in the formula (d14)
all hold and fails if any one of the 12 formulas does not hold.
[0575] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52').

[0576] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0577] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

(Ninth embodiment)
[0578] In the present embodiment, an example of omitting a one-time signature in the third
embodiment will be described. Hereinafter, key setup processing, encryption processing,
re-encryption key generation processing, re-encryption processing, and decryption
processing in the present embodiment will be described. Portions common to the aforementioned
first embodiment may or may not be described by using the same reference signs.
(1) Key setup processing
[0579] First, a public parameter generation unit 13 of a key generator 10 generates a public
parameter

based on a security parameter λ stored in a key parameter storage unit 11 in advance
or acquires the parameter from outside (ST1). Here, g
3=g
π and g
4=g
1π are set. H is a hash function defined by the following formula.

[0580] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i, z
i of Z
p* from Z
p* and sets a private key sk
i= (x
i, y
i, z
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i= (X
i, Y
1i, Z
i, Z
1i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0581] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i= (X
3i, Y
2i) using the private key sk
i and the public parameter par (ST3).

[0582] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j, z
j of Z
p* from Z
p* and sets a private key sk
j= (x
j, y
j, z
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j= (X
j, Y
ij, Z
j, Z
ij) of the decryption device 50 using the private key sk
j and the public parameter par.

[0583] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j= (X
3j, Y
2j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0584] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0585] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number r∈Z
p* to a ciphertext generation unit 24.
[0586] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0587] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i= (C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4) including all the above encrypted data C
2X to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0588] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0589] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0590] A random number generation unit 36 generates and sends out a random number θ∈Z
p* to a re-encryption key generation unit 34.
[0591] The re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas using the random number θ, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).

[0592] In the above formulas, g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0593] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0594] The verification is successful if the four verification formulas shown above all
hold and fails if any one of the four formulas does not hold.
[0595] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out three
random numbers s, t, k∈Z
p* to the re-encryption processing unit 44.
[0596] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s,t,k, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0597] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j= (C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2X, C
2Y, C
2Z, C
2Z1, C
3 , C
4, C
5X, C
5Y, C
5Z, i) by adding all the above re-encrypted data C
2X' to C
5Z and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained re-encrypted data C
j into the temporary data storage unit 42.
[0598] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0599] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0600] Instead of the sixth verification formula in the formula (e1), the following verification
formula may be used.

[0601] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0602] The verification is successful if the 10 verification formulas in the formula (e1)
all hold and fails if any one of the 10 formulas does not hold.
[0603] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0604] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0605] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0606] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the random number θ and the re-encryption key generation key rk
j, effects similar to those in the third embodiment can be obtained.
[0607] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the third embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the third embodiment. Also according to the present embodiment, the amount of computations
needed for encryption processing and re-encryption processing can be reduced when
compared with the embodiment shown in the third embodiment.
[Twentieth modification]
[0608] In the ninth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the ninth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the ninth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0609] The difference between the encryption processing in the present modification and
the encryption processing in the ninth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0610] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formulas (ST51').

[0611] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0612] The verification is successful if the four verification formulas in the formula (e2)
all hold and fails if any one of the four formulas does not hold.
[0613] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0614] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Tenth embodiment)
[0615] In the present embodiment, an example of updating a re-encryption key in the ninth
embodiment at certain intervals will be described. Hereinafter, key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing in the present embodiment will be described. Portions common
to the aforementioned first embodiment or second embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0616] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the ninth embodiment or acquires the parameter from outside
(ST1). H is a hash function defined by the following formula.

[0617] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i, z
i, w
i of Z
p* from Z
p* and sets a private key sk
i= (x
i, y
i, z
i, w
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i= (X
i, Y
1i, Z
i, Z
1i, W
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0618] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i= (X
3i, Y
2i) using the private key sk
i and the public parameter par (ST3).

[0619] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j, z
j, w
j of Z
p* from Z
p* and sets a private key sk
j= (x
j, y
j, z
j, w
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j= (X
j, Y
1j, Z
j, Z
1j, W
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0620] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j= (X
3j, Y
2j) using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0621] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0622] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number r∈Z
p* to a ciphertext generation unit 24.
[0623] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, the public parameter par, and a time parameter
L (ST22).

[0624] The function F
i (L) is defined as shown below.

[0625] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i= (L, C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4) including the time parameter L and all the above encrypted data C
2X to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0626] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0627] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0628] A random number generation unit 36 generates and sends out three random numbers θ,
δ
x, δ
y∈Z
p* to a re-encryption key generation unit 34.
[0629] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random numbers θ, δ
x, δ
y, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32).

[0630] In the above formulas, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.
(4) Re-encryption processing
[0631] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0632] The verification is successful if the five verification formulas shown above all
hold and fails if any one of the five formulas does not hold.
[0633] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out four
random numbers s, t, k, h∈Z
p* to the re-encryption processing unit 44.
[0634] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
5X, C
5Y, C
5Z, C
5FX, C
5FY using these random numbers s,t,k,h, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0635] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j= (L, C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
2F', C
2F", C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4, C
5X, C
5Y, C
5Z, C
5FX, C
5FY, i) by adding all the above re-encrypted data C
2X' to C
5FY and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained ciphertext data into the temporary data storage unit 42.
[0636] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0637] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0638] Instead of the seventh verification formula in the formula (e3), the following verification
formula may be used.

[0639] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0640] The verification is successful if the 12 verification formulas in the formula (e3)
all hold and fails if any one of the 12 formulas does not hold.
[0641] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0642] That the decryption result of the above formula produces m can be checked by the
following calculation.
[0643] In the following calculation, g
1 is rewritten and denoted by g
α and g
2 is rewritten and denoted by g
β.

[0644] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random numbers θ, δ
x, δ
y, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the ninth embodiment, whether
to transfer the decryption right can be decided in each period so that finer access
control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system whose convenience is further improved can be provided.
[0645] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the fourth embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the fourth embodiment. Also according to the present embodiment, the amount of
computations needed for encryption processing and re-encryption processing can be
reduced when compared with the embodiment shown in the fourth embodiment.
[Twenty-first modification]
[0646] In the tenth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the tenth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the tenth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0647] The difference between the encryption processing in the present modification and
the encryption processing in the tenth embodiment is only in the last step. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0649] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0650] The verification is successful if the five verification formulas shown above all
hold and fails if any one of the five formulas does not hold.
[0651] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0652] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Eleventh embodiment)
[0653] In the present embodiment, an example of omitting a one-time signature in the fifth
embodiment will be described. Hereinafter, key setup processing, encryption processing,
re-encryption key generation processing, re-encryption processing, and decryption
processing in the present embodiment will be described. Portions common to the aforementioned
first embodiment may or may not be described by using the same reference signs.
(1) Key setup processing
[0654] First, a public parameter generation unit 13 of a key generator 10 generates a public
parameter

based on a security parameter λ stored in a key parameter storage unit 11 in advance
or acquires the parameter from outside (ST1). H is a hash function defined by the
following formula.

[0655] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects an element x
i of Z
p* from Z
p* and sets a private key sk
i=x
i of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i=X
i of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0656] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=X
1i using the private key sk
i and the public parameter par (ST3).

[0657] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects an element x
j of Z
p* from Z
p* and sets a private key sk
j=x
j of the decryption device 50.
Then, the key generation unit 14 generates a public key pk
j=X
j of the decryption device 50 using the private key sk
j and the public parameter par.

[0658] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=X
1j using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0659] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0660] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number r∈Z
p* to a ciphertext generation unit 24.
[0661] The ciphertext generation unit 24 generates encrypted data C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST22).

[0662] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i= (C
2, C
3, C
4) including all the above encrypted data C
2 to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0663] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0664] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) is re-encrypted into ciphertext
addressed to the decryption device 50 (in the example of FIG. 8, for example, the
user A) (that is, the transfer of decryption right of the ciphertext to the user A).
The decryption device 50 transmits the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0665] Because there is no need to generate a random number for the generation of a re-encryption
key in the present embodiment, a random number generation unit 36 of the re-encryption
key generator 30 is not needed.
[0666] A re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formula using the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, and the public
parameter par (ST32).

(4) Re-encryption processing
[0667] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par and the public
key pk
i of the re-encryption key generator 30 based on the following verification formula
(ST41).

[0668] The verification is successful if the above verification formula holds and fails
if the above verification formula does not hold.
[0669] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out a random
number t∈Z
p* to the re-encryption processing unit 44.
[0670] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2', C
2", C
2'" using the random number t, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ij, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0671] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j= (C
2', C
2", C
2"', C
2, C
3, C
4, i) by adding all the above re-encrypted data C
2' to C
2"' and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained re-encrypted data C
j into the temporary data storage unit 42.
[0672] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0673] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0674] Instead of the first verification formula in the formula (f1), the following verification
formula may be used.

[0675] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0676] The verification is successful if the three verification formulas in the formula
(f1) all hold and fails if any one of the three formulas does not hold.
[0677] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0678] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0679] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the re-encryption key generation key rk
j, effects similar to those in the fifth embodiment can be obtained.
[0680] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the fifth embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the fifth embodiment. Also according to the present embodiment, the amount of computations
needed for encryption processing and re-encryption processing can be reduced when
compared with the embodiment shown in the fifth embodiment.
[Twenty-second modification]
[0681] In the eleventh embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the eleventh embodiment may be changed to a form in which
the ciphertext data is decrypted without being re-encrypted. In this case, only the
key setup processing, encryption processing, and decryption processing need to be
performed. The key setup processing in the present modification is the same as the
key setup processing in the eleventh embodiment. Hereinafter, the encryption processing
and the decryption processing in the present modification will be described.
[0682] The difference between the encryption processing in the present modification and
the encryption processing in the eleventh embodiment is only in the last step. To
provide a description by making use of the above symbols, the identification information
of the decryption device 50 is assumed to be i for the sake of convenience. In this
case, the communication unit 22 of the encryption device 20 transmits the ciphertext
data C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0683] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formula (ST51').

[0684] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0685] The verification is successful if the verification formula in the formula (f3) holds
and fails if the verification formula in the formula (f3) does not hold.
[0686] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0687] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Twenty-third modification]
[0688] In addition to the twenty-second modification, as will be described below, the eleventh
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the eleventh embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0689] No one-time signature is used in the present embodiment either and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
The encryption parameter generation unit 23 of the encryption device 20 generates
and sends out two random numbers r, t∈Z
p* to the ciphertext generation unit 24.
[0690] The ciphertext generation unit 24 generates encrypted data C
2', C
2', C
2"', C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers r,t, the public key pk
j of the decryption device 50, and the public parameter (ST22').

[0691] After step ST22' is completed, the ciphertext generation unit 24 generates ciphertext
data C
j= (C
2', C
2", C
2", C
2, C
3, C
4, j) including all the above encrypted data C
2' to C
4 and the identification information j of the decryption device 50 and writes the obtained
ciphertext data into the temporary data storage unit 21.
[0692] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0693] The decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51').

[0694] Instead of the first verification formula in the formula (f4), the verification formula
shown in the formula (f2) may be used. Also instead of the third verification formula
in the formula (f4), the following verification formula may be used.

[0695] The verification is successful if the three verification formulas in the formula
(f4) all hold and fails if any one of the three formulas does not hold.
[0696] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
j as shown in the following formula using the private key sk
j of the local device 50 and the public parameter par to obtain the message m (ST52').

[0697] That the decryption result of the above formula produces m can be checked by the
following calculation.

(Twelfth embodiment)
[0698] In the present embodiment, an example of updating a re-encryption key in the eleventh
embodiment at certain intervals will be described. Hereinafter, key setup processing,
encryption processing, re-encryption key generation processing, re-encryption processing,
and decryption processing in the present embodiment will be described. Portions common
to the aforementioned first embodiment or second embodiment may or may not be described
by using the same reference signs.
(1) Key setup processing
[0699] A public parameter generation unit 13 of a key generator 10 generates a public parameter
par in the same manner as in the eleventh embodiment or acquires the parameter from
outside (ST1). H is a hash function defined by the following formula.

[0700] If the identification information of a re-encryption key generator 30 is i, a key
generation unit 14 randomly selects elements x
i, y
i of Z
p* from Z
p* and sets a private key sk
i= (x
i, y
i) of the re-encryption key generator 30. Then, the key generation unit 14 generates
a public key pk
i= (X
i, Y
i) of the re-encryption key generator 30 using the private key sk
i and the public parameter par.

[0701] Further, the key generation unit 14 generates a re-encryption key generation key
rk
i=X
1i using the private key sk
i and the public parameter par (ST3).

[0702] Similarly, if the identification information of a decryption device 50 is assumed
to be j, the key generation unit 14 randomly selects elements x
j, y
j of Z
p* from Z
p* and sets a private key sk
j= (x
j, y
j) of the decryption device 50. Then, the key generation unit 14 generates a public
key pk
j= (X
j, Y
j) of the decryption device 50 using the private key sk
j and the public parameter par.

[0703] Further, the key generation unit 14 generates a re-encryption key generation key
rk
j=X
ij using the private key sk
j and the public parameter par (ST6).

(2) Encryption processing
[0704] No one-time signature is used in the present embodiment and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
[0705] An encryption parameter generation unit 23 of an encryption device 20 generates and
sends out a random number s∈Z
p* to a ciphertext generation unit 24.
[0706] The ciphertext generation unit 24 generates encrypted data C
1, C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random number s, the public key pk
i of the re-encryption key generator 30, the public parameter par, and a time parameter
L (ST22).

[0707] The function F
i (L) is defined as shown below.

[0708] After step ST22 is completed, the ciphertext generation unit 24 generates ciphertext
data C
i= (L, C
1, C
2, C
3, C
4) including the time parameter L and all the above encrypted data C
1 to C
4 and writes the obtained ciphertext data into a temporary data storage unit 21.
[0709] A communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to a re-encryption device 40 under the control
of a control unit 25 (ST24).
(3) Re-encryption key generation processing
[0710] Now, assume that the decryption device 50 (in the example of FIG. 8, for example,
the user A) approves that ciphertext addressed to the re-encryption key generator
30 (in the example of FIG. 8, the group administrator) and generated by using L as
the time parameter value is re-encrypted into ciphertext addressed to the decryption
device 50 (in the example of FIG. 8, for example, the user A) (that is, the transfer
of decryption right of the ciphertext to the user A). The decryption device 50 transmits
the re-encryption key generation key rk
j of the decryption device 50 to the re-encryption key generator 30. A communication
unit 33 of the re-encryption key generator 30 acquires and writes the re-encryption
key generation key rk
j of the decryption device 50 into a temporary data storage unit 32 under the control
of a control unit 35 (ST31).
[0711] A random number generation unit 36 generates and sends out a random number r∈Z
p* to a re-encryption key generation unit 34.
[0712] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random number r, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the re-encryption
key generation key rk
j of the decryption device 50 in the temporary data storage unit 32, the public parameter
par, and the time parameter L (ST32).

(4) Re-encryption processing
[0713] A re-encryption processing unit 44 of the re-encryption device 40 verifies the ciphertext
data C
i in a temporary data storage unit 42 using the public parameter par, the time parameter
L contained in the ciphertext data C
i in the temporary data storage unit 42, and the public key pk
i of the re-encryption key generator 30 based on the following verification formulas
(ST41).

[0714] The verification is successful if both verification formulas shown above hold and
fails if any one of the two formulas does not hold.
[0715] If the verification is successful (or the verification processing in step ST41 is
skipped), a re-encryption parameter generation unit 45 generates and sends out two
random numbers t
1,t
2∈Z
p* to the re-encryption processing unit 44.
[0716] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
1', C
1", C
1'", C
2', C
2", C
2'" using the random numbers t
1, t
2, the ciphertext data C
i stored in the temporary data storage unit 42, the re-encryption key R
ijL, the public key pk
i of the re-encryption key generator 30, and the public parameter par (ST42).

[0717] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data Cj=(L,C
1',C
1",C
1'",C
2',C
2", C
2'",C
1,C
2,C
3,C
4,i) by adding all the above re-encrypted data C
1' to C
2'" and the identification information i of the re-encryption key generator 30 to the
ciphertext data C
i and writes the obtained ciphertext data into the temporary data storage unit 42.
[0718] A communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of a control unit 46 (ST43).
(5) Decryption processing
[0719] A decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in a temporary data storage unit 52 using the private key sk
j of the local device 50 in a private key storage unit 51, the public parameter par
in the temporary data storage unit 52, and the public key pk
i of the re-encryption key generator 30 identified by the identification information
i of the re-encryption key generator 30 contained in the re-encrypted data C
j in the temporary data storage unit 52 based on the following verification formulas
(ST51).

[0720] Instead of the third verification formula in the formula (f5), the following verification
formula may be used.

[0721] In this case, the decryption processing unit 54 conducts verification using the public
key pk
j of the local device 50.
[0722] The verification is successful if the five verification formulas in the formula (f5)
all hold and fails if any one of the five formulas does not hold.
[0723] If the verification is successful (or the verification processing in step ST51 is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52).

[0724] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0725] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random number r, the re-encryption key generation key rk
j, and the time parameter L, in addition to the effects of the eleventh embodiment,
whether to transfer the decryption right can be decided in each period so that finer
access control can be exercised. Accordingly, even if the decryption right of ciphertext
for the transfer source (in the example of FIG. 8, the group administrator) is once
transferred to the transfer destination (in the example of FIG. 8, for example, the
user A) in a certain period, it is possible not to grant the decryption right of the
ciphertext for the transfer source to the relevant transfer destination, that is,
the decryption right of the transfer destination (of the ciphertext for the relevant
transfer source) can be invalidated in the next period and therefore, a file sharing
system whose convenience is further improved can be provided.
[0726] Also according to the present embodiment, as described above, due to the configuration
of omitting the one-time signature σ in the sixth embodiment, the data size of ciphertext
data and re-encrypted data can be reduced when compared with the embodiment shown
in the sixth embodiment. Also according to the present embodiment, the amount of computations
needed for encryption processing and re-encryption processing can be reduced when
compared with the embodiment shown in the sixth embodiment.
[Twenty-fourth modification]
[0727] In the twelfth embodiment, an example in which ciphertext data is generated by the
encryption device 20, the ciphertext data is re-encrypted by the re-encryption device
40 to generate re-encrypted data, and the re-encrypted data is decrypted by the decryption
device 50 is cited, but the twelfth embodiment may be changed to a form in which the
ciphertext data is decrypted without being re-encrypted. In this case, only the key
setup processing, encryption processing, and decryption processing need to be performed.
The key setup processing in the present modification is the same as the key setup
processing in the twelfth embodiment. Hereinafter, the encryption processing and the
decryption processing in the present modification will be described.
[0728] The difference between the encryption processing in the present modification and
the encryption processing in the twelfth embodiment is in the last step only. To provide
a description by making use of the above symbols, the identification information of
the decryption device 50 is assumed to be i for the sake of convenience. In this case,
the communication unit 22 of the encryption device 20 transmits the ciphertext data
C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0729] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the private
key sk
i of the local device 50 based on the following verification formula (ST51').

[0730] Incidentally, the decryption device 50 may verify the ciphertext data C
i generated by the encryption device 20 using the public parameter par and the public
key pk
i of the local device 50 in the same manner as in step ST41.
[0731] The verification is successful if both verification formulas in the formula (f7)
hold and fails if any one of the two formulas does not hold.
[0732] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption device 50 decrypts the ciphertext data C
i as shown in the following formula using the private key sk
i of the local device 50 and the public parameter par to obtain the message m (ST52').

[0733] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Twenty-fifth modification]
[0734] In addition to the twenty-fourth modification, as will be described below, the twelfth
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the twelfth embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0735] No one-time signature is used in the present embodiment either and therefore, processing
corresponding to step ST21 and step ST23 in the first embodiment is not performed.
The encryption parameter generation unit 23 of the encryption device 20 generates
and sends out two random numbers t
1,t
2∈Z
p* to the ciphertext generation unit 24.
[0736] The ciphertext generation unit 24 generates encrypted data C
1', C
1", C
1"', C
2', C
2", C
2'", C
1, C
2, C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers t
1,t
2, the public key pk
j of the decryption device 50, the public parameter, and a time parameter L (ST22').

[0737] After step ST22' is completed, the ciphertext generation unit 24 generates ciphertext
data C
j=(L,C
1',C
1",C
1'",C
2',C
2",C
2'",C
1,C
2,C
3,C
4,j) including the time parameter L, all the above encrypted data C
1' to C
4, and the identification information j of the decryption device 50 and writes the
obtained ciphertext data into the temporary data storage unit 21.
[0738] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0739] The decryption processing unit 54 of the decryption device 50 verifies the re-encrypted
data C
j in the temporary data storage unit 52 using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 based on the following verification formulas
(ST51').

[0740] Instead of the third verification formula in the formula (f8), the verification formula
shown in the formula (f6) may be used. Also instead of the fourth and fifth verification
formulas in the formula (f8), the following verification formulas may be used.

[0741] The verification is successful if the five verification formulas in the formula (f8)
all hold and fails if any one of the five formulas does not hold.
[0742] If the verification is successful (or the verification processing in step ST51' is
skipped), the decryption processing unit 54 decrypts the re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device 50 in the private key storage unit 51 and the public parameter
par in the temporary data storage unit 52 to obtain the message m (ST52').

[0743] That the decryption result of the above formula produces m can be checked by the
following calculation.

[0744] According to at least one of the embodiments described above, due to the configuration
of generating a re-encryption key based on a re-encryption key generation key, safe
file sharing can be realized. For example, if the transfer destination (in the example
of FIG. 8, for example, the user A) does not notify the transfer source (in the example
of FIG. 8, the group administrator) of the re-encryption key generation key, a re-encryption
key cannot be generated and therefore, re-encryption without approval of the transfer
destination (that is, the transfer of decryption right of ciphertext to the relevant
transfer destination) can be prevented.
[0745] Scenes of using each of the above embodiments will be described below.
[0746] The following three methods (1) to (3) can be cited in a file sharing system in which
a user uploads a file to a server and the file is shared among a plurality of users
as a method of maintaining confidentiality of file in the server.
- (1) Individual key scheme in which a file is encrypted by an individual encryption
key for each user
- (2) Shared key scheme in which a file is encrypted by an encryption key shared by
each user
- (3) Re-encryption scheme in which a file is encrypted using a proxy re-encryption
scheme
[0747] In the above (1) to (3) schemes, the user who uploads a file to the server is assumed
to be the user A and the user A shares the file with the user B and the user C.
[0748] In the individual key scheme in (1), each user has a set of a private key and a public
key that differ from user to user. The user A encrypts a file by the public key of
the user B (as an individual encryption key for the user B) and uploads the encrypted
file to the server. Similarly, the user A encrypts the file by the public key of the
user C (as an individual encryption key for the user C) and uploads the encrypted
file to the server. That is, the user A individually encrypts the file for each of
the users who share the file.
[0749] In the shared key scheme in (2), each user shares a set of a private key and a public
key common to each user. The user A encrypts a file by the public key (as an encryption
key common to each user) and uploads the encrypted file to the server. Each user shares
the same private key.
[0750] In the proxy re-encryption scheme in (3), like the individual key scheme in (1),
each user has a set of a private key and a public key that differ from user to user.
In contrast to the individual key scheme in (1), however, the user A only needs to
encrypt a file by the public key (hereinafter, called a group public key) of an entity
(hereinafter, called the group administrator) that manages a group of users. The server
uses the re-encryption key to re-encrypt the encrypted file (uploaded by the user
A) into an encrypted file that can be decrypted only by each user. Details of the
proxy re-encryption scheme will be described later.
[0751] In the individual key scheme in (1), if the file should newly be shared also by a
user D, a problem arises that it is necessary for the user A to encrypt the file by
the public key of the user D (as an individual encryption key of the user D) and upload
the encrypted file to the server. Therefore, the method in (1) complicates the processing
to add new users when the number of new users or the number of shared file is large,
making the method unsuitable for a file sharing system.
[0752] In the shared key scheme in (2), a problem arises that when a certain user (who has
been allowed to share files till a certain point in time) should be prevented from
being able to share files (the relevant user should be excluded from the file sharing
system) from that point in time, a mechanism that updates the private key and public
key common to each user is separately needed or if the private key common to each
user should be leaked, all encrypted files could be decrypted (by anyone who has acquired
the leaked key). Therefore, the shared key scheme in (2) is unsuitable for a file
sharing system.
[0753] In the proxy re-encryption scheme in (3), on the other hand, the server uses the
re-encryption key to re-encrypt one piece of ciphertext into ciphertext that can be
decrypted only by each user and thus, the above problems can be solved by adopting
a configuration in which the user is not notified of the re-encryption key. Therefore,
the proxy re-encryption scheme in (3) is suitable for a file sharing system. The proxy
re-encryption scheme described above presents no particular problem, but if a problem
should be brought up, a server is enabled to create re-encrypted text without permission
of each user. Therefore, from the viewpoint of realizing safe file sharing, there
is room for improvements of the proxy re-encryption scheme and the invention according
to the present embodiment can realize safe file sharing.
[0754] Next, thirteenth and fourteenth embodiments using public information for re-encryption
key generation will be described.
(Thirteenth embodiment)
[0755] The basic model of the proxy re-encryption scheme according to the thirteenth and
fourteenth embodiments includes, like the above case, five functions. Similarly, depending
on the implementation method of re-encryption, a model that differs in input into
the functions and a model including other functions or keys than the above are also
considered.
[0756] For example, a model, like the re-encryption scheme shown in the present embodiment,
in which the public key is divided into a public key for encryption and public information
for generating a re-encryption key can be considered, but in conventional technology,
a model in which the division into the public key for encryption and public information
for generating a re-encryption key is not implemented also exists.
[0757] Also, similarly to that described above, a model known as a non-interactive model
and a model into which, instead of a private key skA of the user A, a re-encryption
key rkA→B addressed to the user B and a private key skC of the user C are input are
also considered.
[0758] Also, similarly to that described above, a model known as a unidirectional model
and a model called a bidirectional model are known.
[0759] Next, the configuration and effects of file sharing systems according to the thirteenth
and fourteenth embodiments are similar to the configuration and effects of the file
sharing system described using FIGS. 7 and 8. In the thirteenth and fourteenth embodiments,
however, instead of FIG. 8, FIG. 18 is used because public information for generating
a re-encryption key is used.
[0760] FIG. 12 is a schematic diagram showing the configuration of a re-encryption system
according to the thirteenth embodiment. (The correspondence between FIGS. 12 and 18
will be described later.) The re-encryption system includes a key generator 10, an
encryption device 20, a re-encryption key generator 30, a re-encryption device 40,
and a decryption device 50. The key generator 10 generates various parameters of the
re-encryption system and also a public key for encryption, public information for
generating a re-encryption key, and a private key for each of the devices 40, 50.
[0761] The encryption device 20 transmits ciphertext data obtained by encrypting plaintext
data using a public key for encryption corresponding to a private key of the re-encryption
key generator 30 to the re-encryption device 40.
[0762] The re-encryption key generator 30 generates a re-encryption key using the private
key of the re-encryption key generator 30, the public information for generating a
re-encryption key of the decryption device 50, and a random number.
[0763] The re-encryption device 40 transmits, to the decryption device 50, re-encrypted
data obtained by re-encrypting the ciphertext data received from the encryption device
20 by the re-encryption key without decrypting the ciphertext data.
[0764] The decryption device 50 performs verification processing of the re-encrypted data
using the public key for encryption of the re-encryption key generator 30 and also
performs decryption processing of the re-encrypted data using the private key corresponding
to the public key for encryption of the local device 50 to obtain plaintext data.
While a plurality of units of the re-encryption key generator 30, the re-encryption
device 40, or the decryption device 50 may be provided, here a case in which one unit
of each device is provided is taken as an example.
[0765] The correspondence between FIGS. 12 and 18 will be described. Each of the devices
10 to 50 is held by an entity that performs the relevant processing. When the user
generates each of a public key for encryption, public information for generating a
re-encryption key, and a private key of the user, the relevant user holds the key
generator 10.
[0766] If, for example, the user administrator or the group administrator generates each
of a public key for encryption, public information for generating a re-encryption
key, and a private key of the user, the user administrator or the group administrator
holds the key generator 10. The user holds the encryption device 20 or the decryption
device 50 or both. The group administrator holds the re-encryption key generator 30.
[0767] If, for example, the user administrator or the server Sv generates a re-encryption
key, the user administrator or the server Sv holds the re-encryption key generator
30. The server Sv holds the re-encryption device 40. In the file sharing system illustrated
in FIG. 18, the server Sv holds a public key storage unit 1, a ciphertext storage
unit 2, a re-encryption key storage unit 3, and a public information for generating
re-encryption key storage unit 4 and the user C who performs encryption acquires a
public key for encryption used for encryption from the public key storage unit 1.
However, the present embodiment is not limited to such an example and the user C may
acquire, as will be described later, a public key for encryption used for encryption
from the key generator 10 (that has generated the public key for encryption used for
encryption). The server Sv stores ciphertext E (pkGr,m) generated by the user C in
the ciphertext storage unit 2. The ciphertext storage unit 2 may be included in the
re-encryption device 40 or an outside storage device not included in the re-encryption
device 40.
[0768] Which entity holds which device is not limited to the above example and various variations
can be considered. The user administrator or the group administrator may or may not
serve also as a user. Each user device used by each user may be called a first user
device, a second user device,... Similarly, the public key for encryption, the public
information for generating a re-encryption key, and the private key generation key
of each user device may be called the first public key for encryption, the first public
information for generating a re-encryption key, and the first private key of the first
user device, the second public key for encryption, the second public information for
generating a re-encryption key, and the second private key of the second user device,...
[0769] Subsequently, the configuration of each of the devices 10 to 50 will concretely be
described.
[0770] The key generator 10 includes a key generation parameter storage unit 11, a temporary
data storage unit 12, a public parameter generation unit 13, a key generation unit
14, a communication unit 15, and a control unit 16.
[0771] The key generation parameter storage unit 11 is a storage device that stores key
generation parameters.
[0772] The temporary data storage unit 12 is a storage device that stores temporary data
such as data being processed by each of the generation units 13, 14 and processing
results.
[0773] The public parameter generation unit 13 generates a public parameter for key generation.
[0774] The key generation unit 14 generates a public key for encryption, public information
for generating a re-encryption key, and a private key addressed to a user.
[0775] The communication unit 15 is a communication interface to communicate between the
key generator 10 and the other devices 20, 30, 40, 50 and has, for example, each of
the following functions (f15-1), (f15-2):
(f15-1) Function to transmit the public key for encryption, public information for
generating a re-encryption key, and private key of each of the devices 30, 50 in the
temporary data storage unit 12 to each of the relevant devices 30, 50 under the control
of the control unit 16.
(f15-2) Function to transmit the public key for encryption of the re-encryption key
generator 30 in the temporary data storage unit 12 to the encryption device 20 under
the control of the control unit 16.
[0776] In the description that follows, the description that transmission/reception goes
through the communication unit 15 may be omitted to avoid a redundant description
during transmission/reception. This also applies to each communication unit of the
other devices 20, 30, 40, 50 than the key generator 10.
[0777] The control unit 16 has a function to control each of the units 11 to 15 of the key
generator 10 such that each unit operates as shown in FIG. 13.
[0778] The encryption device 20 includes a temporary data storage unit 21, a communication
unit 22, an encrypted data generation unit 23, a ciphertext generation unit 24, and
a control unit 25.
[0779] The temporary data storage unit 21 is a storage device that stores a public key for
encryption of the re-encryption key generator 30 received from the key generator 10
and transient data (hereinafter, written as "temporary data") such as data being processed
by each of the generation devices 23, 24 and processing results.
[0780] The communication unit 22 is a communication interface to communicate between the
encryption device 20 and the other devices 10, 30, 40, 50 and has, for example, each
of the following functions (f22-1), (f22-2):
(f22-1) Function to acquire the public key for encryption of the re-encryption key
generator 30 published to the key generator 10 and to write the public key for encryption
into the temporary data storage unit 21.
(f22-2) Function to transmit the ciphertext data in the temporary data storage unit
21 to the re-encryption device 40 under the control of the control unit 25.
[0781] The encryption parameter generation unit 23 has a function to generate an encryption
parameter.
[0782] The ciphertext generation unit 24 has, for example, each of the following functions
(f24-1), (f24-2):
(f24-1) Function to generate ciphertext data by encrypting plaintext data using the
public key for encryption (first public key of the first user device) of the re-encryption
key generator 30 read from the temporary data storage unit 21.
(f24-2) Function to write the obtained ciphertext data into the temporary data storage
unit 21.
[0783] The control unit 25 has a function to control each of the units 21 to 24 such that
each unit operates as shown in FIG. 14.
[0784] The re-encryption key generator 30 includes a private key storage unit 31, a temporary
data storage unit 32, a communication unit 33, a re-encryption key generation unit
34, a control unit 35, and a random number generation unit 36.
[0785] The private key storage unit 31 is a storage device that stores a private key of
the re-encryption key generator 30 received from the key generator 10.
[0786] The temporary data storage unit 32 is a storage device that stores public information
for generating a re-encryption key of the decryption device 50 received from the key
generator 10 and temporary data such as data being processed by the re-encryption
device 34 and processing results.
[0787] The communication unit 33 is a communication interface to communicate between the
re-encryption key generator 30 and the other devices 10, 20, 40, 50 and has, for example,
a function to transmit the re-encryption key in the temporary data storage unit 32
to the re-encryption device 40 under the control of the control unit 35.
[0788] The re-encryption key generation unit 34 has, for example, each of the following
functions (f34-1), (f34-2):
(f34-1) Function to generate a re-encryption key based on the private key of the re-encryption
key generator 30 read from the private key storage unit 31 (first private key of the
first user device), the public information for generating a re-encryption key read
from the decryption device 50 read from the temporary data storage unit 32 (second
public information for generating a re-encryption key of the second user device),
and a random number generated by the random number generation unit 36 (in this function,
a parameter, more specifically, a random number for encryption is not needed).
[0789] The function (f34-1) to generate a re-encryption key may generate a re-encryption
key based on the first private key, second public information for generating a re-encryption
key, and random number independently of ciphertext data before re-encryption. The
public key for encryption of the re-encryption key generator 30 may be generated based
on the first private key and a plurality of system fixed values. The second public
information for generating a re-encryption key may be generated based on the second
private key and a plurality of system fixed values.
[0790] (f34-2) Function to write the re-encryption key into the temporary data storage unit
32.
[0791] The control unit 35 has a function to control each of the units 31 to 34, 36 such
that each unit operates as shown in FIG. 15.
[0792] The random number generation unit 36 has a function to generate and send out a random
number to the re-encryption key generation unit 34.
[0793] The re-encryption device 40 includes a re-encryption key storage unit 41, a temporary
data storage unit 42, a communication unit 43, a re-encryption processing unit 44,
a re-encryption parameter generation unit 45, and a control unit 46.
[0794] The re-encryption key storage unit 41 is a storage unit that stores the re-encryption
key received from the re-encryption key generator 30.
[0795] The temporary data storage unit 42 is a storage device that stores temporary data
such as data being processed by the re-encryption processing unit 44 and processing
results.
[0796] The communication unit 43 is a communication interface to communicate between the
re-encryption device 40 and the other devices 10, 20, 30, 50 and has, for example,
each of the following functions (f43-1), (f43-2):
(f43-1) Function to send out ciphertext data received from the encryption device 20
to the re-encryption processing unit 44.
(f43-2) Function to transmit the re-encrypted data in the temporary data storage unit
42 to the decryption device 50 under the control of the control unit 46.
[0797] The re-encryption processing unit 44 has, for example, each of the following functions
(f44-1), (f44-2):
(f44-1) Function to obtain re-encrypted data by, when ciphertext data is received
from the encryption device 20, re-encrypting the ciphertext data using the re-encryption
key read from the re-encryption key storage unit 41 without decrypting the ciphertext
data.
(f44-2) Function to write the obtained re-encrypted data into the temporary data storage
unit 42.
[0798] The control unit 46 has a function to control each of the units 41 to 45 such that
each unit performs an operation (not shown) to deliver a re-encrypted text verification
program and operates as shown in FIG. 16.
[0799] The decryption device 50 includes a private key storage unit 51, a temporary data
storage unit 52, a communication unit 53, a decryption processing unit 54, and a control
unit 56.
[0800] The private key storage unit 51 is a storage device that stores a private key of
the decryption device 50 received from the key generator 10.
[0801] The temporary data storage unit 52 is a storage device that stores a public key for
encryption/public information for generating a re-encryption key of the decryption
device 50 received from the key generator 10 and a public key for encryption of the
re-encryption key generator 30 and also temporary data such as data being processed
by the decryption processing unit 54 and processing results.
[0802] The communication unit 53 is a communication interface to communicate between the
decryption device 50 and the other devices 10, 20, 30, 40 and has, for example, each
of the following functions (f53-1) to (f53-3):
(f53-1) Function to write a private key of the decryption device 50 received from
the key generator 10 into the private key storage unit 51.
(f53-2) Function to write a public key for encryption/public information for generating
a re-encryption key of the decryption device 50 received from the key generator 10
and a public key for encryption of the re-encryption key generator 30 into the temporary
data storage unit 52.
(f53-3) Function to send out re-encrypted data received from the re-encryption device
40 to the decryption processing unit 54.
[0803] The decryption processing unit 54 has, for example, each of the following functions
(f54-1) to (f54-3):
(f54-1) Function to obtain plaintext data by, when re-encrypted data is received from
the re-encryption device 40, performing decryption processing on the re-encrypted
data based on the private key of the decryption device 50 read from the private key
storage unit 51 (second private key of the second user device).
(f54-2) Function to write the obtained plaintext data into the temporary data storage
unit 52.
[0804] The control unit 56 has a function to control each of the units 51 to 54 such that
each unit operates as shown in FIG. 17.
[0805] Next, the operation of the re-encryption system configured as described above will
be described using the sequence diagrams of FIGS. 13 to 17.
[0806] The following operation takes a case in which processing is performed in a procedure
of (1) key setup processing, (2) encryption processing, (3) re-encryption key generation
processing, (4) re-encryption processing, and (5) decryption processing as an example.
However, in the following operation, processing is not necessarily performed following
the above procedure. For example, processing of re-encryption key generation may be
performed before the encryption processing. Also, ciphertext data may be decrypted
without the re-encryption processing being performed.
- (1) The key setup processing is performed by the key generator 10 as shown in FIG.
13 and each of steps ST1 to ST12 below.
[0807] First, the public parameter generation unit 13 of the key generator 10 generates
a public parameter (p, λ, G, G
T, g, g
1, g
2, g
3, g
4, u, v, Sig (Ĝ, S , V̂)) or acquires the public parameter from outside (ST1).
[0808] More specifically, the public parameter generation unit 13 generates bilinear map
groups (G,G
T) satisfying the order p>2λ, elements g,g
1,g
2,g
3,g
4,u,v of G, and a one-time signature algorithm Sig (Ĝ,Ŝ,V̂) satisfying strong unforgeability
based on a security parameter λ stored in the key parameter storage unit 11 in advance.
[0809] Z
p* is a set (=(Z/pZ)
*) of integers mutually prime to Z
p and p and may also be called a multiplicative group Z
p* for the prime number p. Z
p is a set (=(Z/pZ) of integers equal to 0 or greater and less than p. The "element"
is a term having a mathematical meaning, is also called a constituent, and refers
to, in a set constituted of a plurality of "things", individual things constituting
the set.
[0810] More specifically, the public parameter generation unit 13 selects bilinear map groups
(G,G
T) satisfying the order p>2λbased on the security parameter λ stored in the key generation
parameter storage unit 11 in advance. In this case, p is an integer. p may be a prime
number or a composite number. The public parameter generation unit 13 randomly selects
elements g, g
1, g
2, u, v of G from G. The public parameter generation unit 13 randomly selects ξ from
Z
p* and calculates g
3=gξ and g
4=g
1ξ. Z
p* is a set (=(Z/pZ)
*) of integers mutually prime to Z
p and p and may also be called a multiplicative group Z
p* for p. Z
p is a set (=(Z/pZ) of integers equal to 0 or greater and less than p. g
3 is a value based on a random number ξ and a system fixed value g. g
4 is a value based on the random number and a system fixed value g
1.
[0811] Ĝ in the one-time signature algorithm Sig(Ĝ,Ŝ,V̂) (hereinafter, Sig(Ĝ,Ŝ,V̂)
is also called Sig) means a function to generate a one-time key pair (ssk, svk), Ŝ
means a function to generate a signature σ for a message M, and V̂ means a function
to validate the signature σ.
[0813] The bilinear map (denoted by e) is a map yielding e:G×G→G
T and satisfies the following three properties:
- 1. e(ga,hb)=e(g,h) ab holds for any (g,h)∈G×G and a,b∈Z, where Z is a set of integers.
- 2. e(g,h) is computable for any (g,h)∈G×G.
- 3. e(g,h)≠1GT always holds if g,h≠1G, where 1G is the unit element of G and 1GT is the unit element of GT.
[0814] The bilinear map group (denoted by G, G
T) is a group of the prime number order p for which a bilinear map e:G×G→G
T exists. The above definition also means that if g
1=g
α and g
2=g
β for elements g, g
1, g
2 of G, the following equation holds (α and β are the exponents relating to elements
g, g
1, g
2 of G).

[0815] Incidentally, a plurality of elements g, g
1, g
2 of G is a plurality of preset system fixed values. The plurality of system fixed
values is not limited to three elements of the bilinear map group G and a plurality
of elements such as two or four or more elements of G can also be used when appropriate.
The term of "system fixed value" may be changed to a "fixed value", an "element",
or a "system parameter". The plurality of system fixed values are a plurality of elements
of a bilinear map group as a group of prime number orders for which a bilinear map
exists.
[0816] In this specification, the notation assuming that both G and G
T are multiplicative groups is adopted, but the embodiments are not limited to such
a notation and each of G, G
T can be represented by a notation assuming that each is an additive group. That is,
for example, G may be represented as an additive group and G
T as a multiplicative group. As the bilinear map, a map that yields e:G
1×G
2→G
T for bilinear map groups G
1, G
2, G
T (G
1 and G
2 are different groups) may also be used. In this case, each element of G in each piece
of processing described later may be rewritten to an element of G
1 or an element of G
2 when appropriate. The above also apply to other embodiments.
[0817] Subsequently, the public parameter generation unit 13 writes the generated public
parameter par into the temporary data storage unit 12. The key generator 10 publishes
the public parameters p,λ,G,G
T,g,g
1,g
2,g
3,g
4,u,v,Sig) in the temporary data storage unit 12 (ST2). If a public parameter is published
before step ST1 is executed, step ST1 and step ST2 may be skipped by writing the public
parameter into the temporary data storage unit 12.
[0818] If the identification information of the re-encryption key generator 30 is i, the
key generation unit 14 generates a private key x
i, y
i, z
i∈Z
p* of the re-encryption key generator 30 and generates a public key for encryption of
the re-encryption key generator 30 using the private key sk
i=(x
i,y
i,z
i) (ST7).

[0819] If a twenty-seventh modification described later is not made, data Yi may be omitted.
That is, the public key pk
i only needs to include data X
i, Y
1i, Z
i, Z
1i.
[0820] Also, the key generation unit 14 generates public information
pii = (
X3i,
Y2i) for generating a re-encryption key of the re-encryption key generator 30 using the
private key sk
i=(x
i,y
i,z
i) (ST7').
Here,

[0821] Subsequently, the key generation unit 14 writes the generated public key for encryption,
public information for generating a re-encryption key, and private key into the temporary
data storage unit 12. The communication unit 15 transmits the private key sk
i in the temporary data storage unit 12 to the re-encryption key generator 30 under
the control of the control unit 16 (ST8). The key generator 10 publishes the public
key for encryption pk
i of the re-encryption key generator 30 in the temporary data storage unit 12 (ST9).
[0822] Similarly, if the identification information of the decryption device 50 is j, the
key generation unit 14 generates a private key sk
j=(x
j,y
j,z
j) of the decryption device 50 and generates a public key for encryption of the decryption
device 50 using the private key sk
j (ST10).

Here,

[0823] Similarly as described above, if the twenty-seventh modification described later
is not made, data Yj may be omitted. That is, the public key pk
j only needs to include data X
j, Y
1j, Z
j, Z
1j.
[0824] Also, the key generation unit 14 generates public information for generating a re-encryption
key of the decryption device 50 using the private key sk
j (ST10').

[0825] Subsequently, the key generation unit 14 writes the generated public key for encryption,
public information for generating a re-encryption key, and private key into the temporary
data storage unit 12. The communication unit 15 transmits the private key sk
j in the temporary data storage unit 12 to the decryption device 50 under the control
of the control unit 16 (ST11). The key generator 10 publishes the public information
for generating a re-encryption key pij of the decryption device 50 in the temporary
data storage unit 12 (ST12). If desired, regarding the private key skh, the public
key for encryption pk
h, and the public information for generating a re-encryption key pi
h, the public key for encryption pk
h of the encryption device 20, the private key sk
h may be transmitted to the encryption device 20 to publish the public key for encryption
pk
h and the public information for generating a re-encryption key pi
h in accordance with purposes by performing processing similar to each of steps ST10
to ST12.
[0826] With the above processing, the key setup processing is completed. Hereinafter, each
of the devices 20, 30, 40, 50 can acquire and use the public parameter or public key
published in steps ST2, ST6, ST9, ST12 when appropriate.
(2) The encryption processing is performed by the encryption device 20 as shown in
FIG. 14 and each of steps ST21 to ST24 below.
[0827] The encryption parameter generation unit 23 of the encryption device 20 generates
a key pair (ssk,svk)=Ĝ(λ) of a signature key ssk and a verification key svk in a
one-time signature using the security parameter λ and a key pair generation function
Ĝ in the public parameter par (ST21) and sets the verification key svk to encrypted
data C
1 (C
1=svk).
[0828] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to the ciphertext generation unit 24.
[0829] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r and the public key for encryption pk
i of the re-encryption key generator 30 (ST22).

[0830] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the encrypted data C
3, C
4 based on the signature generation function Ŝ in the public parameter and the signature
key ssk generated in step ST21 (ST23).

[0831] Thereafter, the ciphertext generation unit 24 generates ciphertext data Ci= (C
1,C
2X, C
2Y,C
2Z,C
2Z1,C
3,C
4,σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21. If the verification is omitted, the ciphertext data C
i=(C
1,C
2X,C
2Y,C
2Z,C
2Z1,C
3,C
4,σ) may be set as C
i=(C
2X,C
2Y,C
2Z,C
2Z1,C
3) by omitting verification data (C
1,C
4,σ) that is not used for decryption. In this case, processing to generate the verification
data (C
1,C
4,σ) is also omitted.
[0832] In any case, the communication unit 22 transmits the ciphertext data C
i in the temporary data storage unit 21 to the re-encryption device 40 under the control
of the control unit 25 (ST24).
[0833] With the above processing, the encryption processing is completed.
[0834] In the present embodiment, as described above (also, as will be described later),
verification may be omitted or generation of verification data may be omitted and
this also applies to an embodiment and modifications described later.
(3) The re-encryption key generation processing is performed by the re-encryption
key generator 30 as shown in FIG. 15 and each of steps ST31 to ST33 below.
[0835] That is, the communication unit 33 of the re-encryption key generator 30 acquires
and writes the public information for generating a re-encryption key pi
j of the decryption device 50 published by the key generation unit 10 into the temporary
data storage unit 32 under the control of the control unit 35 (ST31). In step ST5
described above, the communication unit 33 has received the private key sk
i of the re-encryption key generator 30 from the key generator 10 and written the private
key into the private key storage unit 31,
[0836] The random number generation unit 36 generates and sends out a random number γ∈Z
p* to the re-encryption key generation unit 34.
[0837] The re-encryption key generation unit 34 generates a re-encryption key R
ij as shown in the following formulas based on the random number γ, the private key
sk
i of the re-encryption key generator 30 in the private key storage unit 31, and the
public information for generating a re-encryption key pi
j of the decryption device 50 in the temporary data storage unit 32 (ST32).

[0838] In the above formula, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.
[0839] Thereafter, the re-encryption key generation unit 34 writes the generated re-encryption
key R
ij into the temporary data storage unit 32. The communication unit 33 transmits the
re-encryption key R
ij in the temporary data storage unit 32 to the re-encryption device 40 under the control
of a control unit 35 (ST33).
[0840] With the above processing, the re-encryption key generation processing is completed.
(4) The re-encryption processing is performed by the re-encryption device 40 as shown
in FIG. 16 and each of steps ST41 to ST43 below.
[0841] The communication unit 43 of the re-encryption device 40 writes the ciphertext data
C
i transmitted in step ST24 and the re-encryption key R
ij transmitted in step ST33 into the temporary data storage unit 42.
[0843] The verification is successful if the five verification formulas shown above all
hold and fails if any one of the five formulas does not hold.
[0844] If the verification is successful, the re-encryption parameter generation unit 45
generates and sends out three random numbers s,t,k∈Z
p* to the re-encryption processing unit 44.
[0845] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z using these random numbers s,t,k, the ciphertext data C
i in the temporary data storage unit 42, and the re-encryption key R
ij in the temporary data storage unit 42 (ST42).

[0846] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(C
1,C
2X',C
2X", C
2Y',C
2Y", C
2Z',C
2Z", C
2Z1',C
2Z1",C
5X, C
5Y,C
5Z,C
3,C
4,σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1 in the ciphertext data C
i by all the above encrypted data/re-encrypted data C
2X' to C
5Z and writes the obtained re-encrypted data C
j into the temporary data storage unit 42. If the verification is omitted, the re-encrypted
data C
j=(C
1,C
2X',C
2X",C
2Y',C
2Y",C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X, C
5Y,C
5Z,C
3,C
4,σ) may be set as C
j=(C
2X",C
2Y",C
2Z",C
2Z1",C
5X, C
5Y,C
5Z,C
3) by omitting verification data (C
1,C
2X',C
2Y',C
2Z',C
2Z1',C
4,σ) that is not used for decryption. In this case, processing to generate the verification
data (C
2X',C
2Y',C
2Z',C
2Z1') is also omitted.
[0847] In any case, the communication unit 43 transmits the re-encrypted data C
j in the temporary data storage unit 42 to the decryption device 50 under the control
of the control unit 46 (ST43).
[0848] With the above processing, the re-encryption processing is completed.
(5) The decryption processing is performed by the decryption device 50 as shown in
FIG. 17 and each of steps ST51 and ST52 below.
[0849] That is, the communication unit 53 of the decryption device 50 receives the re-encrypted
data C
j transmitted in step ST43 and writes the re-encrypted data C
j into the temporary data storage unit 52.
[0851] The verification is successful if the seven verification formulas shown above all
hold and fails if any one of the seven formulas does not hold.
[0852] If the verification is successful, the decryption processing unit 54 decrypts the
re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device to obtain the message m (ST52).

[0853] That the decryption result of the above formula produces m can be checked by the
following calculation. In the following calculation, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.

[0854] Incidentally, the decryption processing unit 54 may perform the decryption processing
in step ST52 by omitting the verification processing in step ST51. Also, when no verification
data is contained in the re-encrypted data C
j, the decryption processing unit 54 performs the decryption processing in step ST52
by omitting the verification processing in step ST51. The above m may be a key, instead
of a message itself. For example, a shared key in shared key cryptography may be set
as m=key to replace m with key. In this case, ciphertext obtained by encrypting a
message using the shared key may be added to the ciphertext data or re-encrypted data.
The above also apply to the embodiment and modifications described later.
[0855] In the present embodiment, the order of processing may be changed when appropriate.
For example, the order of the decryption processing and the ciphertext verification
processing may be changed. Similarly, because a parameter (more specifically, a random
number) for performing encryption processing is not needed in the re-encryption key
generation processing, the order of the re-encryption key generation processing may
be changed to before the encryption processing.
[0856] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ij based on the random number γ, even if a server and a user collude with each other,
the decryption right can be prevented from being re-transferred without permission
of the transfer source. Accordingly, there is no need to demand extreme reliability
from the server and a file sharing system the user can safely use can be provided.
[0857] To complement the above description, there has been a problem that, if the server
operator, the user B, and the user E collude, a third party can calculate a normal
re-encryption key (rk
A→
E) to re-encrypt ciphertext for the user A into ciphertext for the user E by using
a re-encryption key (rk
A→
B) to re-encrypt the ciphertext for the user A into ciphertext for the user B, a private
key (sk
B) of the user B, and a private key (sk
E) of the user E without permission of the user A as the transfer source.
[0858] According to the present embodiment, however, due to the configuration of generating
the re-encryption key R
ij based on the random number γ, even if the server operator, the user B, and the user
E collude, the decryption right can be prevented from being re-transferred without
permission of the transfer source.
[0859] Also, due to the configuration of generating a re-encryption key using public information
for generating a re-encryption key of the original transfer destination, no re-encryption
key can be generated without the public information for generating a re-encryption
key being provided by the transfer destination. Therefore, a re-encryption key can
be generated with the permission of the original transfer destination.
[Twenty-sixth modification]
[0860] In the thirteenth embodiment, an example in which ciphertext data is generated by
the encryption device 20, the ciphertext data is re-encrypted by the re-encryption
device 40 to generate re-encrypted data, and the re-encrypted data is decrypted by
the decryption device 50 is cited. However, the thirteenth embodiment may be changed
to a form in which the ciphertext data is decrypted without being re-encrypted. In
this case, only the key setup processing, encryption processing, and decryption processing
need to be performed. The key setup processing in the present modification is the
same as the key setup processing in the thirteenth embodiment. Hereinafter, the encryption
processing and the decryption processing in the present modification will be described.
[0861] The difference between the encryption processing in the present modification and
the encryption processing in the thirteenth embodiment is only in the last step. To
provide a description by making use of the above symbols, the identification information
of the decryption device 50 is assumed to be i for the sake of convenience. In this
case, the communication unit 22 of the encryption device 20 transmits the ciphertext
data C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0862] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 in the same manner as in step ST41. If the
verification is successful, the decryption device 50 decrypts the ciphertext data
C
i as shown in the following formula using the private key sk
i to obtain the message m.

[0863] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Twenty-seventh modification]
[0864] In addition to the twenty-sixth modification, as will be described below, the thirteenth
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the thirteenth embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0865] The encryption parameter generation unit 23 of the encryption device 20 generates
(ssk, svk) in the same manner as in step ST21 (ST21') and sets the verification key
svk to the encrypted data C
1 (C
1=svk).
[0866] The encryption parameter generation unit 23 also generates and sends out five random
numbers r,s,t,k,γ∈Z
p* to the ciphertext generation unit 24.
[0867] The ciphertext generation unit 24 generates encrypted data C
2X', C
2X", C
2Y', C
2Y", C
2Z', C
2Z", C
2Z1', C
2Z1", C
5X, C
5Y, C
5Z, C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers r,s,t,k,γ and the public key for encryption
pk
j of the decryption device 50 (ST22').

[0868] After step ST22' is completed, the ciphertext generation unit 24 generates a one-time
signature σ in the same manner as in step ST23.
[0869] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
j= (C
1,C
2X',C
2X",C
2Y',C
2Y", C
2Z',C
2Z",C
2Z1',C
2Z1",C
5X,C
5Y,C
5Z,C
3,C
4,σ) including all the above encrypted data C
1 to C
4 and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0870] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25.
[0871] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51. If the
verification is successful, the decryption device 50 decrypts the ciphertext data
C
j as shown in the following formula using the private key sk
j to obtain the message m.

[0872] That the decryption result of the above formula produces m can be checked by the
following calculation. In the following calculation, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.

[Twenty-eighth modification]
[0873] In the thirteenth embodiment, an example in which the public parameter includes five
elements g, g
1, g
2, g
3, g
4 of system fixed values has been described, but the embodiment is not limited to such
an example and the elements g
2, g
3, g
4 may not be generated and included in the public parameter. In this case, g
2, g
3, and g
4 may be replaced by g in the thirteenth embodiment by setting g
2=g, g
3=g, and g
4=g. This also applies to the embodiments and modifications described later.
[Twenty-ninth modification]
[0874] In the thirteenth embodiment, an example in which the public parameter includes five
elements g, g
1, g
2, g
3, g
4 of system fixed values has been described, but the embodiment is not limited to such
an example and six or more elements of system fixed values may be included. If, for
example, six elements g, g
1, g
2, g
3, g
4, g
5 are included in the public parameter, g
2 may be replaced by g
2g
5 in the thirteenth embodiment by setting g
2=g
2g
5.
[0875] Also if, for example, seven elements g, g
1, g
2, g
3, g
4, g
5, g
6 are included in the public parameter, g
1 may be replaced by g
1g
5, g
2 may be replaced by g
2g
6, and g
4 may be replaced by g
4g
5 in the thirteenth embodiment by setting g
1=g
1g
5, g
2=g
2g
6, and g
4=g
4g
5. This also applies to the embodiment and modifications described later.
(Fourteenth embodiment)
[0876] In the present embodiment, an example of updating a re-encryption key at certain
intervals will be described. A time parameter L is used as a parameter representing
a period. The time parameter is used in, of key setup processing, encryption processing,
re-encryption key generation processing, re-encryption processing, and decryption
processing, the encryption processing, the re-encryption key generation processing,
and the re-encryption processing. The time parameter is used such that if, for example,
encryption processing is performed in a certain period t
1, the encryption processing described later is performed by setting L=t
1 and if encryption processing is performed in the next period t
2, the encryption processing described later is performed by setting L=t
2. Hereinafter, key setup processing, encryption processing, re-encryption key generation
processing, re-encryption processing, and decryption processing in the present embodiment
will be described. Portions common to the aforementioned thirteenth embodiment may
or may not be described by using the same reference signs.
(1) Key setup processing
[0877] The public parameter is the same as that in the thirteenth embodiment. If the identification
information of a re-encryption key generator 30 is i, a key generation unit 14 generates
a private key x
i, y
i, z
i, w
i∈Z
p* of the reencryption key generator 30 and generates a public key for encryption of
the re-encryption key generator 30 using the private key sk
i=(x
i,y
i,z
i,w
i) (ST7).

[0878] Also, the key generation unit 14 generates public information for generating a re-encryption
key of the re-encryption key generator 30 using the private key sk
i (ST7').

[0879] Similarly, if the identification information of a decryption device 50 is j, the
key generation unit 14 generates a private key sk
j=(x
j,y
j,z
j,w
j) of the decryption device 50 and generates a public key for encryption of the decryption
device 50 using the private key sk
j (ST10).

[0880] Also, the key generation unit 14 generates public information for generating a re-encryption
key of the decryption device 50 using the private key sk
j (ST10').

(2) Encryption processing
[0881] Like in the thirteenth embodiment, an encryption parameter generation unit 23 of
an encryption device 20 generates (ssk, svk) (ST21') and sets the verification key
svk to the encrypted data C
1 (C
1=svk).
[0882] The encryption parameter generation unit 23 also generates and sends out a random
number r∈Z
p* to a ciphertext generation unit 24.
[0883] The ciphertext generation unit 24 generates encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F, C
3, C
4 below from a message m∈G
T as plaintext data using the random number r, the public key for encryption pk
i of the re-encryption key generator 30, and the time parameter L (ST22).

[0884] The function F
i (L) is defined as shown below.

[0885] After step ST22 is completed, the ciphertext generation unit 24 generates a one-time
signature σ as shown in the following formula for the time parameter L and the encrypted
data C
3, C
4 based on the signature generation function Ŝ in the public parameter and the signature
key ssk generated in step ST21 (ST23).

[0886] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
i=(L,C
1,C
2X,C
2Y,C
2Z,C
2Z1,C
2F,C
3, C
4,σ) including the time parameter L, all the above encrypted data C
1 to C
4, and the one-time signature σ and writes the obtained ciphertext data into a temporary
data storage unit 21.
(3) Re-encryption key generation processing
[0887] A random number generation unit 36 generates and sends out three random numbers γ,
δ
x, δ
y∈Z
p* to a re-encryption key generation unit 34.
[0888] The re-encryption key generation unit 34 generates a re-encryption key R
ijL as shown in the following formulas using the random numbers γ, δ
x, δ
y, the private key sk
i of the re-encryption key generator 30 in a private key storage unit 31, the public
information for generating a re-encryption key pi
j of the decryption device 50 in a temporary data storage unit 32, and the time parameter
L (ST32).

[0889] In the above formula, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.
(4) Re-encryption processing
[0891] The verification is successful if the six verification formulas shown above all hold
and fails if any one of the six formulas does not hold.
[0892] If the verification is successful, a re-encryption parameter generation unit 45 generates
and sends out four random numbers s,t,k,h∈Z
p* to the re-encryption processing unit 44.
[0893] The re-encryption processing unit 44 generates, as shown in the following formulas,
re-encrypted data C
2X', C
2X'', C
2Y', C
2Y'', C
2Z', C
2Z'', C
2Z1', C
2Z1'', C
2F', C
2F'', C
5X, C
5Y, C
5Z, C
5FX, C
5FY using these random numbers s,t,k,h, the ciphertext data C
i in the temporary data storage unit 42, the re-encryption key R
ijL in the temporary data storage unit 42, and the time parameter L (ST42).

[0894] After step ST42 is completed, the re-encryption processing unit 44 generates re-encrypted
data C
j=(C
1,C
2X',C
2X'', C
2Y', C
2Y'', C
2Z', C
2Z'', C
2Z1', C
2Z1'', C
2F', C
2F'', C
5X, C
5Y, C
5Z, C
5FX, C
5FY, C
3, C
4, σ) by replacing the encrypted data C
2X, C
2Y, C
2Z, C
2Z1, C
2F in the ciphertext data C
i by all the above encrypted data/re-encrypted data C
2X' to C
5FY and writes the obtained ciphertext data into the temporary data storage unit 42.
(5) Decryption processing
[0896] The verification is successful if the eight verification formulas shown above all
hold and fails if any one of the eight formulas does not hold.
[0897] If the verification is successful, the decryption processing unit 54 decrypts the
re-encrypted data C
j as shown in the following formula using the private key sk
j of the local device to obtain the message m (ST52).

[0898] That the decryption result of the above formula produces m can be checked by the
following calculation. In the following calculation, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.

[0899] In the present embodiment, the order of processing may be changed when appropriate.
For example, the order of the decryption processing and the ciphertext verification
processing may be changed. Similarly, the order of the re-encryption key generation
processing may be changed to before the encryption processing.
[0900] According to the present embodiment, as described above, due to the configuration
of generating the re-encryption key R
ijL based on the random numbers γ, δ
x, δ
y and the time parameter L, in addition to the effects of the thirteenth embodiment,
whether to transfer the decryption right can be decided in each period so that finer
access control can be exercised. Accordingly, even if the decryption right of ciphertext
for the user A is once transferred to the user B in a certain period, it is possible
not to grant the decryption right of the ciphertext for the user A to the user B,
that is, the decryption right of the user B (to the ciphertext for the user A) can
be invalidated in the next period and therefore, a file sharing system whose convenience
is further improved can be provided.
[Thirtieth modification]
[0901] In the fourteenth embodiment, an example in which ciphertext data is generated by
the encryption device 20, the ciphertext data is re-encrypted by the re-encryption
device 40 to generate re-encrypted data, and the re-encrypted data is decrypted by
the decryption device 50 is cited, but the eleventh embodiment may be changed to a
form in which the ciphertext data is decrypted without being re-encrypted. In this
case, only the key setup processing, encryption processing, and decryption processing
need to be performed. The key setup processing in the present modification is the
same as the key setup processing in the fourteenth embodiment. Hereinafter, the encryption
processing and the decryption processing in the present modification will be described.
[0902] The difference between the encryption processing in the present modification and
the encryption processing in the fourteenth embodiment is only in the last step. To
provide a description by making use of the above symbols, the identification information
of the decryption device 50 is assumed to be i for the sake of convenience. In this
case, the communication unit 22 of the encryption device 20 transmits the ciphertext
data C
i in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25 (ST24').
[0903] The decryption device 50 verifies the ciphertext data C
i generated by the encryption device 20 in the same manner as in step ST41. If the
verification is successful, the decryption device 50 decrypts the ciphertext data
C
i as shown in the following formula using the private key sk
i to obtain the message m.

[0904] That the decryption result of the above formula produces m can be checked by the
following calculation.

[Thirty-first modification]
[0905] In addition to the thirtieth modification, as will be described below, the fourteenth
embodiment may also be changed to a form in which the ciphertext data is decrypted
without being re-encrypted. Also in this case, only the key setup processing, encryption
processing, and decryption processing need to be performed. The key setup processing
and the decryption processing in the present modification are the same as the key
setup processing and the decryption processing in the fourteenth embodiment respectively.
Hereinafter, the encryption processing and the decryption processing in the present
modification will be described. In the present modification, the identification information
of the decryption device 50 is assumed to be j.
[0906] The encryption parameter generation unit 23 of the encryption device 20 generates
(ssk, svk) in the same manner as in step ST21 (ST21') and sets the verification key
svk to the encrypted data C
1 (C
1=svk).
[0907] The encryption parameter generation unit 23 also generates and sends out eight random
numbers r,s,t,k,h,γ,δ
x,δ
y∈Z
p* to the ciphertext generation unit 24.
[0908] The ciphertext generation unit 24 generates encrypted data C
2X', C
2X'', C
2Y', C
2Y'', C
2Z', C
2Z'', C
2Z1', C
2Z1'', C
2F', C
2F'', C
5X, C
5Y, C
5Z, C
5FX, C
5FY, C
3, C
4 below from a message m∈G
T as plaintext data using the random numbers r,s,t,k,h,γ,δ
x,δ
y, the public key pk
j of the decryption device 50, and the time parameter L (ST22').

[0909] After step ST22' is completed, the ciphertext generation unit 24 generates a one-time
signature σ in the same manner as in step ST23.
[0910] Thereafter, the ciphertext generation unit 24 generates ciphertext data C
j= (L, C
2X',C
2X'', C
2Y', C
2Y'', C
2Z', C
2Z'', C
2Z1', C
2Z1'', C
2F', C
2F'', C
5X, C
5Y,C
5Z,C
5FX,C
5FY,C
3,C
4,σ) including the time parameter L, all the above encrypted data C
1 to C
4, and the one-time signature σ and writes the obtained ciphertext data into the temporary
data storage unit 21.
[0911] The communication unit 22 transmits the ciphertext data C
j in the temporary data storage unit 21 to the decryption device 50 under the control
of the control unit 25.
[0912] The decryption device 50 verifies the ciphertext data C
j generated by the encryption device 20 in the same manner as in step ST51. If the
verification is successful, the decryption device 50 decrypts the ciphertext data
C
j as shown in the following formula using the private key sk
j to obtain the message m.

[0913] That the decryption result of the above formula produces m can be checked by the
following calculation. In the following calculation, g
1 is rewritten and denoted by g
α, g
2 is rewritten and denoted by g
β, g
3 is rewritten and denoted by g
ξ, and g
4 is rewritten and denoted by g
αξ.

[0914] According to at least one of the thirteenth and fourteenth embodiments described
above, due to the configuration of generating a re-encryption key based on a random
number, even if a server and a user collude with each other, the decryption right
can be prevented from being re-transferred without permission of the transfer source.
[0915] Also, due to the configuration of generating a re-encryption key using public information
for generating a re-encryption key of the original transfer destination, no re-encryption
key can be generated without the public information for generating a re-encryption
key being provided by the transfer destination. Therefore, a re-encryption key can
be generated with the permission of the original transfer destination.
[0916] The method described in the embodiment can also be stored in a storage medium such
as a magnetic disk (floppyTM disk, hard disk, or the like), an optical disk (CD-ROM,
DVD, or the like), a magneto-optical disk (MO), or a semiconductor memory as a program
which can be executed by a computer and distributed.
[0917] As the storage medium, any configuration which is a computer-readable storage medium
in which a program can be stored may be used regardless of a storage format.
[0918] An OS (operating system) which operates on a computer on the basis of an instruction
of a program installed from the storage medium in the computer, database management
software, and MW (middleware) such as network software may execute a part of the processes
to realize the embodiment.
[0919] Furthermore, the storage medium according to the present invention includes not only
a medium independent of a computer but also a storage medium in which a program transmitted
through a LAN, the Internet, or the like is downloaded and stored or temporarily stored.
[0920] The number of storage media is not limited to one. A case in which the process in
the embodiment is executed from a plurality of media is included in the storage medium
according to the present invention. Any medium configuration may be used.
[0921] A computer according to the present invention is to execute the processes in the
embodiments on the basis of the program stored in a storage medium. The computer may
have any configuration such as one apparatus constituted by a personal computer or
a system in which a plurality of apparatuses are connected by a network.
[0922] A computer in each embodiment includes not only a personal computer but also an arithmetic
processing apparatus, a microcomputer, or the like included in an information processing
apparatus. The computer is a generic name of an apparatus and a device which can realize
the functions of the present invention by a program.
[0923] While certain embodiments have been described, these embodiments have been presented
by way of example only, and are not intended to limit the scope of the inventions.
Indeed, the novel embodiments described herein may be embodied in a variety of other
forms; furthermore, various omissions, substitutions and changes in the form of the
embodiments described herein may be made without departing from the spirit of the
inventions. The accompanying claims and their equivalents are intended to cover such
forms or modifications as would fall within the scope and spirit of the inventions.